Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy

august lock

cybersecurity budgets

KPIs for managing and optimizing devsecops success

CISOs need to make devsecops a priority. These KPIs can help align both security and nonsecurity stakeholders as to where, why, and how security fits into the process

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

surge protector

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert

Be it a lightning strike that destroys a home entertainment center or fluctuating power that degrades the life of your electronics – surges, lightning, and power disturbances can have a devastating impact on the valuable electronics...

looking ahead spying

Google can read your corporate data. Are you OK with that?

Some cloud providers reserve the right to scan your data for various violations, but few enterprises know if they or their employees have agreed to such terms of service

shipping containers

4 extra-strength container security tools for Docker and Kubernetes

These third-party offerings bring enterprise monitoring, policy-based controls, in-container auditing, and hardened Linux kernels to container-based applications

Information Security
video

What is blockchain? Get up to speed with this video primer

Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.

kidde alarm

48% off Kidde Carbon Monoxide Alarm with Display and 10 Year Battery - Deal Alert

Kidde calls this model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 seconds. Currently discounted down to just $28 on Amazon.

orange and white life preserver on white background

How containers and microservices change security

Cloud-native applications and infrastructure require a radically different approach to security. Keep these best practices in mind

Hacker
video

4 old malware threats still haunting business today

From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.

face superimposed on keyboard privacy hacker

Devsecops: Add security to complete your devops process

New data shows that enterprises are moving to devops with integrated security teams, processes, and tools. That should be standard practice

Info_sec
video

Learn the ins and outs of Europe's General Data Protection Regulation (GDPR)

Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at...

security incident responder

Centralized security in the cloud is the best security model

Sadly, enterprises don't like the idea of a central trust service in the cloud to secure both their cloud and local systems

questions analytics

What is Grafeas? Better auditing for containers

Google's Grafeas provides a common API for metadata about containers, from image and build details to security vulnerabilities

bossies 2017 main

Bossies 2017: The Best of Open Source Software Awards

InfoWorld celebrates the leading open source projects for software development, cloud computing, machine learning, data storage and analytics, and security

bos17 networking security lg

Bossie Awards 2017: The best networking and security software

InfoWorld picks the top open source software for protecting networks and their users

keys to access solutions admission movie ticket

Manage access control using Redis Bitfields

How to create a high-performance, highly available, and flexible access control system using binary data and bitwise operators in Redis

cloud man megaphone

Safer but not immune: Cloud lessons from the Equifax breach

Suddenly, everyone is an expert on enterprise security, and the cloud is claimed to be a silver bullet for security. It’s not that simple

Hidden cloud migration gotchas

From equanimity to Equifax

What the Equifax breach should show CIOs and CISOs about open-source software quality

Load More