Security

Expert advice on firewalls, malware prevention, application security, hacking, endpoint protection, and security strategy


iot security

Enterprise IoT threatens to undermine cloud and IT security

We finally just got cloud security right, and now we're screwing it up with new thermostats and copiers that make all that good security worthless

kidde alarm

32% off Kidde Carbon Monoxide Alarm with Display and 10 Year Battery - Deal Alert

Kidde calls this model "worry free" because its sensor and sealed battery provide 10 years of uninterrupted CO detection, and a digital display that updates every 15 seconds. Currently discounted down to $35 on Amazon.

nordvpn

Get 3 Years of NordVPN Service for Just $2.75 Per Month - Holiday Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.75 per month for 3 years, if you sign up right now.

apc backup

30% off APC 1500VA Compact UPS Battery Backup & Surge Protector

The Back-UPS Pro uninterruptible power supply provides power to your critical devices during an outage, allowing you to continue working or gaming, and stay connected to your network. Ideal for PCs, home office electronics, networking...

wide 2017.12.06 11.00.51.avi.11 21 57 57.still001
video

Zero Trust networks and enterprise security strategy | Salted Hash Ep 12

Executives at cloud services vendor Akamai -- David Lewis, global security advocate; Andy Ellis, CSO; and Charlie Gero, CTO -- talk with host Steve Ragan about the evolving role of security in the enterprise.

devops programmer computer

3 predictions for devsecops in 2018

The year 2018 will bring the start of some real change for devsecops in the enterprise

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

Salted Hash Ep 10 Steve Ragan
video

Office 365 phishing examples | Salted Hash Ep 10

Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.

astract code [Thinkstock]

What’s new in PHP 7.2: better security, code handling

The first feature update to PHP 7 since December 2015 has arrived

title image 0 00 16 06
video

Tech Talk: Uber hack, Google tracks, AWS packs (in China) ... and Firefox is back

Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla...

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

sh ep7
video

Matrix Banker malware spreads to multiple industries | Salted Hash Ep 7

The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.

august lock

11% off August Smart Lock Pro With Connect Bundle - Deal Alert

Lock and unlock your door, control keyless access, and keep track of who comes and goes, all from your phone.

cybersecurity budgets

KPIs for managing and optimizing devsecops success

CISOs need to make devsecops a priority. These KPIs can help align both security and nonsecurity stakeholders as to where, why, and how security fits into the process

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

surge protector

15% off APC 11-Outlet Surge Protector with USB Charging Ports and SurgeArrest - Deal Alert

Be it a lightning strike that destroys a home entertainment center or fluctuating power that degrades the life of your electronics – surges, lightning, and power disturbances can have a devastating impact on the valuable electronics...

looking ahead spying

Google can read your corporate data. Are you OK with that?

Some cloud providers reserve the right to scan your data for various violations, but few enterprises know if they or their employees have agreed to such terms of service

shipping containers

4 extra-strength container security tools for Docker and Kubernetes

These third-party offerings bring enterprise monitoring, policy-based controls, in-container auditing, and hardened Linux kernels to container-based applications

Load More