How to Export Your Passwords From LastPass

WIRED Threat Level

The popular security service is severely limiting its free tier starting March 16. If you’d like to move your passwords to another manager, here’s how. Security Gear / How To and Advice Gear / Products / Apps

Thinking of a Cybersecurity Career? Read This

Krebs on Security

Thousands of people graduate from colleges and universities each year with cybersecurity or computer science degrees only to find employers are less than thrilled about their hands-on, foundational skills. So what should you focus on, and what’s the best way to get started?


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Cloud Protection: How to Secure Server Environments

Data Breach Today

Cloud 209

Crisis Communications: How to Handle Breach Response

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce

How to Measure DevSecOps Progress and Ensure Success

Speaker: Shannon Lietz, Director of DevSecOps Team, Intuit

The new DevSecOps team is up and running, and you feel ready to take on rising security threats while delivering quality software updates. But that leaves just one question: how do you monitor your new program as effectively and efficiently as possible? Join Shannon Lietz, Director of DevsecOps at Intuit, and award-winning innovator, to learn the answers to these questions so you can lead your DevSecOps team to the top!

How to Address Telehealth Cloud Security Risks

Data Breach Today

With the surge in telehealth use during the COVID-19 pandemic, healthcare organizations must be prepared to deal with cloud security and privacy risks, says Jim Angle of Trinity Health, who is the author of a recent report from the Cloud Security Alliance

Risk 151

Achieving Seamless eDiscovery

OpenText Information Management

From litigation support personnel to the lawyers themselves, organizations face a common challenge: how to streamline processes and procedures to simplify and thoroughly respond to on-going litigation requests. Technologies Discovery eDiscovery Security Services

Career Choice Tip: Cybercrime is Mostly Boring

Krebs on Security

The findings come in a new paper released by researchers at Cambridge University’s Cybercrime Centre , which examined the quality and types of work needed to build, maintain and defend illicit enterprises that make up a large portion of the cybercrime-as-a-service market.

How to Clean Up Your Digital History

WIRED Threat Level

There are plenty of reasons to declutter your online traces. Here's how to tidy up. Security Security / Security Advice

COVID-19 Response: How to Secure a 100% Remote Workforce

Data Breach Today

Cybereason CSO Sam Curry on Business Continuity and Reducing Risk Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011.

Risk 203

The Next-Generation Cloud Data Lake: An Open, No-Copy Data Architecture

A next-gen cloud data lake architecture has emerged that brings together the best attributes of the data warehouse and the data lake. This new open data architecture is built to maximize data access with minimal data movement and no data copies.

How to Block Advanced Threats

Data Breach Today

Focus on 'Total Cost of Control,' Says BlackBerry Cylance's John McClurg After years of organizations being stuck in a reactive security posture, proactive prevention is finally possible thanks to machine learning backed by AI math models, says BlackBerry Cylance's John McClurg

COVID-19 Crisis: How to Manage VPNs

Data Breach Today

Practitioners Share Insights on How They're Addressing VPN Shortcomings Security practitioners around the world are struggling to cope with the challenges posed by remote workers heavily relying on virtual private networks during the Covid-19 pandemic.

How to Make a Security Transformation

Data Breach Today

RSA's Ganesh Prasad on Understanding Risk Exposure in a Digital Transformation A successful digital transformation journey must include a security transformation journey that includes a careful examination of risks, says Ganesh Prasad of RSA

How to Avoid Phishing Emails and Scams

WIRED Threat Level

Security Security / Security AdviceIt's is a bigger threat than ever. Here are some ways you can defend yourself.

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

How to Check Your Devices for Stalkerware

WIRED Threat Level

Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder. Security Security / Privacy Security / Security AdviceYou deserve privacy.

How to Secure Machine Learning

Dark Reading

Part two of a series on avoiding potential security risks with ML

Risk 83

How to Stay Secure on GitHub

Dark Reading

Here are ways to keep your development team from getting burned on GitHub GitHub, used badly, can be a source of more vulnerabilities than successful collaborations.

How to Shop Online Like a Security Pro

Krebs on Security

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online. Even people who shop mainly at big-name online stores can get scammed if they’re not wary of too-good-to-be-true offers.

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cybersecurity threats. As technology leaders, it's time to rethink some of your product security strategies. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

How to Fight Against 'Authorized Payment Fraud'

Data Breach Today

Two Card Security Experts Describe Effective Strategies Implementation of 3D Secure 2.0,

How to Better Secure Your Microsoft 365 Environment

Dark Reading

Security experts offer Microsoft 365 security guidance as more attackers target enterprise cloud environments

Cloud 111

How to Implement Microsegmentation

eSecurity Planet

In an era where the network edge faces the highest traffic, organizations rush to add more robust security yet hesitate to take on the long-term endeavor known as microsegmentation. Approaches to microsegmentation. Environment and security vs. microsegmentation.

QR Codes: A Sneaky Security Threat


What to watch out for, and how to protect yourself from malicious versions of these mobile shortcuts.

How to Build a Resilient IoT Framework

Dark Reading

For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges

IoT 100

How to Improve SD-WAN Security

eSecurity Planet

Your SD-WAN solution comes with built-in security, but it's likely not enough to meet enterprise security requirements. Here are some next steps

How to Avoid Unnecessary Breach Reporting

Data Breach Today

Healthcare organizations need to diligently assess whether a security incident involving patient information truly qualifies as a reportable breach under HIPAA to avoid needlessly reporting it to federal regulators, says regulatory attorney Helen Oscislawski

How to Understand the Russia Hack Fallout

WIRED Threat Level

Security Security / Cyberattacks and HacksNot all SolarWinds victims are created equal.

How to Run a Successful Penetration Test

Dark Reading

These seven tips will help ensure a penetration test improves your organization's overall security posture

How to Implement Zero Trust

eSecurity Planet

Zero trust has gone from new idea to buzzword and industry paradigm in a decade. As organizations look to strengthen their network security or update their cybersecurity defenses, the gospel of zero trust awaits. . Also Read: Top Zero Trust Security Solutions of 2021 .

How to Manage API Security

Dark Reading

Here's what security pros need to know about "the invisible glue" that keeps apps talking to each other Protecting the places where application services meet is critical for protecting enterprise IT.

How to Tell Which Emails Quietly Track You

WIRED Threat Level

Your emails know more about you than you might think, like when you open them or when you forward them to others. Security Security / Security Advice Security / Privacy

Friction Affliction: How to Balance Security With User Experience

Dark Reading

There's a fine line between protecting against suspicious, malicious, or unwanted activity and making users jump through hoops to prove themselves

How to Effectively Use AI and ML in Security

Data Breach Today

Group-IB's Aleksandr Lazarenko on Overcoming the Challenges It's difficult to build a reliable security system based on artificial intelligence and machine learning, says Aleksandr Lazarenko of Group-IB, who offers insights on how to make the most of these technologies

How to Boost Executive Buy-In for Security Investments

Dark Reading

Linking security budgets to breach-protection outcomes helps executives balance spending against risk and earns CISOs greater respect in the C-suite

Risk 96

COVID-19: How to Adjust Business Continuity Plans

Data Breach Today

The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center.

How to Control Security Costs During a Down Economy

Dark Reading

Three key areas security professionals should watch when managing their budgets

How to Keep Your Zoom Chats Private and Secure

WIRED Threat Level

Security Security / Security AdviceTrolls. Prying bosses. Zoom's a great video chat platform, but a few simple steps also make it a safe one.

How to Extend Security Across Your Kubernetes Infrastructure

Security Affairs

How to enhance the security across a Kubernetes Infrastructure and mitigate the risk of cyber attacks. The security risks surrounding containers are well-known. Indeed, the problem is that the Kubernetes infrastructure itself presents its own security risks.