Once limited to Windows, .NET also now allows developers to easily build apps for Linux, MacOS, and Android
Stories by Josh Fruhlinger
EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behaviour.
Beamforming uses the science of electromagnetic interference to make Wi-Fi and 5G connections more precise.
In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers.
We trace the rise of free open source software—code that can be freely modified and shared—from philosophical outlier to modern powerhouse
A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.
Developers spend countless hours solving business problems with code. Then it’s the ops team’s turn to spend countless hours, first figuring out how to get the code that developers write up and running on whatever computers are available, and second making sure those computers operate smoothly. The second part truly is a never-ending task. Why not leave that part to someone else?
A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.
Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications.
Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden.
A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike.
Catch a glimpse of what flourishes in the shadows of the internet.
Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.
Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.
The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.