How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

How to Make a Security Transformation

Data Breach Today

RSA's Ganesh Prasad on Understanding Risk Exposure in a Digital Transformation A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. How do you know the lifespan of a site selling that must-have gadget at the lowest price?

How to Effectively Use AI and ML in Security

Data Breach Today

Group-IB's Aleksandr Lazarenko on Overcoming the Challenges It's difficult to build a reliable security system based on artificial intelligence and machine learning, says Aleksandr Lazarenko of Group-IB, who offers insights on how to make the most of these technologies

How to Prepare for Misconfigurations Clouding the Corporate Skies


With cloud misconfigurations rampant in cloud storage and IaaS environments, adding security layers to identify them is crucial for securing sensitive data.

Cloud 84

How to Manage API Security

Dark Reading

Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other Protecting the places where application services meet is critical for protecting enterprise IT.

How to Shift Security Practices From Monitoring to Observability

Data Breach Today

Or, is it the new way to find out "why" (and not just "if") your system, IT or application isn't working as expected? Is 'Observability' just a disingenuous rebrand of 'monitoring'? Is it monitoring on steroids?

How to Keep Your Web Servers Secure

Dark Reading

The good news is that Web servers have come a long way in terms of security. But to err is human, even for IT and security people

OnDemand Webinar | How to Secure Custom Apps Without Code

Data Breach Today

Accelerating the development of secure custom apps without coding. The number one gating factor for true edge compute on mobile is security, and that's a hard thing to get into a mobile app

Beyond 'Black Box' MSSP Security: How to Get the Most

Data Breach Today

Matt Peters of Expel Describes Hybrid Approaches to Security Operations For a managed security service provider to deliver maximum value for customers, it needs to provide a hybrid approach that delivers not only actionable security information but also context, says Matt Peters of Expel

A Practical Guide to Zero-Trust Security


There are five different pillars to implement when moving to a modern, zero-trust security model. Cloud Security InfoSec Insider IoT Mobile Security five pillars how to architect implementation tips infosec insider practical guide tony kueh vmware zero-trust security

How to Achieve 'Laser-Cut Fraud Prevention'

Data Breach Today

Trusteer's Avner Gideoni on Creating the Perfect Defensive Blend How do machine learning, threat intelligence and advanced analytics blend together to form agile and accurate fraud prevention?

How to Get Your Equifax Settlement Money

WIRED Threat Level

Security Security / Security NewsA settlement with the FTC means Equifax will pay victims of its breach $125 or more. Make sure it pay ups.

IT 114

How to Lock Down Your Health and Fitness Data

WIRED Threat Level

Here's how to control what they can see, and what they can do with it. Security Security / PrivacyApps like FitBit and Apple Health collect some of the most sensitive data you have.

IT 107

How To Clear Out Your Zombie Apps and Online Accounts

WIRED Threat Level

They're a security risk. Here's how to get rid of them. Security Security / Security AdviceAll those services you signed up for but forgot about?

Risk 114

How to Build a Cloud Security Model

Dark Reading

Security experts point to seven crucial steps companies should be taking as they move data and processes to cloud environments

Cloud 87

Serverless Cloud Security: How to Secure Serverless Computing

eSecurity Planet

Serverless is a new computing paradigm that also introduces new security risks. Learn what serverless is and security steps organizations need to take

Risk 102

How to Manage a Security Operations Center

eSecurity Planet

We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work

DevSecOps: How to Build Security into Apps

eSecurity Planet

We define DevSecOps, how it relates to DevOps, and how security can be built into the application development process with minimal disruption

The Debate Over How to Encrypt the Internet of Things

WIRED Threat Level

Security Security / Security NewsSo-called lightweight encryption has its place. But some researchers argue that more manufacturers should stick with proven methods.

Strong, streamlined and secure: How to get the most out of centralized key management

Thales eSecurity

With organizations around the world now deploying ever-increasing amounts of encryption solutions in an effort to ward off cybercrime, businesses are facing a combination of challenges. Using algorithms to encode data as ciphertext, encryption acts as a safety blanket for data.

How to Secure ‘Permissioned’ Blockchains

Thales eSecurity

Permissioned blockchains are growing in popularity as businesses attempt to cash in on the blockchain trend while keeping a firm hand on the tiller. You can also find Duncan’s previous Dark Reading blog, “If blockchain is the answer, what is the security question” here. Data security

Open Source Security - How to Defend at the Speed of Attack

Data Breach Today

On the sixth stop of a multi-city tour, ISMG and Sonatype visited San Francisco for an engaging discussion on how to mitigate risks introduced by open source software. Sonatype CMO Matt Howard discusses the relevance and value of this application security conversation

Risk 140

How to Comprehend the Buzz About Honeypots

Dark Reading

Honeypots are crucial tools for security researchers and security teams. Understanding what they are and what they can do can be critical for making them safe and useful for your organization

Cyber Exposure: How to Discover, Measure and Reduce Your Risk

Data Breach Today

Tenable's Diwaker Dayal on Benchmarking the Success of Your Security Posture How does an organization measure cybersecurity success? For too many, it's simply the absence of a breach.

Risk 196

How to Avoid Card Skimmers at the Pump

Krebs on Security

But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station. Booth said the SAPD has yet to see a skimming incident involving newer pump models like the one pictured directly above.

How Does Encryption Work?

Productivity Bytes

The word “encryption” is synonymous with data protection, and most people are aware of its functionality in their day-to-day lives within a digital context. The post How Does Encryption Work? Cybersecurity How-To Tech how-to security

How to manage content chaos

OpenText Information Management

ILTACON has been a staple for legal and IT professionals for over 40 years, and this year’s conference promises not to disappoint. Spend less time searching for … The post How to manage content chaos appeared first on OpenText Blogs. Discovery Enterprise Content Management Information Management Security AI cloud Data ediscovery analytics email enterprise content management Integration OpenText

IT 66

How to Secure Your Wi-Fi Router and Protect Your Home Network

WIRED Threat Level

Router security has improved a bunch in recent years, but there are still steps you can take to lock yours down even better. Security Security / Security Advice

How to Share Your Netflix, Hulu, Amazon, and Spotify Accounts the Safe Way

WIRED Threat Level

Security Security / Security AdviceBe generous, but also be safe.

Security expert shows how to bypass macOS Gatekeeper

Security Affairs

A security researcher demonstrated how to bypass the Apple macOS Gatekeeper by leveraging trust in network shares. The Italian security researcher Filippo Cavallarin demonstrated how to bypass the macOS Gatekeeper by leveraging trust in network shares. The Apple Gatekeeper is designed to protect OS X users by performing a number of checks before allowing an App to run.

How to Control API Security Risks

eSecurity Planet

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks

Risk 77

How to Create Smarter Risk Assessments

Dark Reading

Executives and directors need quantitative measurements - such as likelihood of loss and hard-dollar financial impact - to make more informed decisions about security risks

Risk 102

How to Get Your Yahoo Breach Settlement Money

WIRED Threat Level

Security Security / Security AdviceIf you had a Yahoo account from 2012-2016, you probably have $100 coming your way.

How to lose your password

Thales eSecurity

The tsunami of passwords that exist across every aspect of our digital life means that there’s a thriving underground industry of cyber-criminals trying to get at them. Equifax – I could go on, but you might want to play with this visualisation instead. Data security

It's Time to Get a Password Manager: Bitwarden, 1Password, Dashlane, LastPass

WIRED Threat Level

Your brain has better things to do than store secure passwords. Get a dedicated password manager to keep your login data synced and secure across all devices. Gear Gear / How To and Advice Security

How to Get the Most Out of Your Security Metrics

Dark Reading

There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives