security: End user/client security

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

NSA Prism: Inside The Modern Surveillance State
The government's approach seems to be: "Collect first, ask questions later."

Twitter's Two-Factor Authentication: 5 Reasons To Avoid
Two-step verification system has no provision for backup access or lost phones, doesn't address public username problem.

Twitter Two-Factor Authentication: Too Little, Too Late?
Two-factor authentication is a good step. But for securing many sites, Twitter included, it's not enough.

CISPA 2.0: House Intelligence Committee Fumbles Privacy Again
Cybersecurity bill's backers portray threat intelligence sharing as a panacea, but yet again ignore the potential privacy and security downsides.

Kill Passwords: Hassle-Free Substitute Wanted
Passwords keep proliferating, but do new technologies and approaches offer an alternative? Maybe.

Security Tools Show Many Dots, Few Patterns
Today's security software wastes valuable time by delivering data dumps, rather than focusing on trends. But you can create your own visualizations.

McAfee Takes Belize: Social Engineering Lesson
Eccentric antivirus firm founder John McAfee says he tricked people with spyware -- using free laptops. Social engineering attacks remain cheap,...

Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.

The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
Top Stories
-
What Prism Knows: 8 Metadata Facts
June 19, 2013Data traffic analysis could provide "megadata" intelligence agencies can use to cross-reference information using big data techniques.
-
Security ROI: 5 Practices Analyzed
June 19, 2013Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.
-
Privacy Concerns: Big Data's Biggest Barrier?
June 18, 2013Businesses must be up front with consumers about what data they're using and why. Opting out should be easier, too.
-
CrowdStrike Falcon Traces Attacks Back To Hackers
June 18, 2013Startup that encourages playing offense on security launches cloud-based service to help businesses identify adversaries, mitigate attacks and...
-
LulzSec Hacker Ryan Cleary To Be Released
June 13, 2013Release comes despite being convicted of possessing child porn images and serving only a portion of his sentence, leading hackers to suggest he's...
-
12 Security Myths That Put Users At Risk
June 11, 2013Security experts weigh in on the dirty dozen misconceptions that make endpoints vulnerable.
-
NSA Prism: Patriot Act Author Questions Scope
June 11, 2013White House says NSA's surveillance programs implement FISA and the Patriot Act -- but Patriot Act author is not so sure. Meanwhile, privacy...
-
NSA Prism: Inside The Modern Surveillance State
June 10, 2013The government's approach seems to be: "Collect first, ask questions later."
-
Glasgow City Council Fined For Security Lapses
June 07, 2013Stolen laptops and repeated cases of unencrypted data top the list of the City of Glasgow's security failings.
-
NSA PRISM Creates Stir, But Appears Legal
June 07, 2013Massive information-sharing program involves Google, Facebook and other technology heavyweights, top secret document details. But NSA looks to...
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue