Q. I've been hearing a lot lately about firewalls, worms and patches. What are they, and do I need to worry? A. Those terms relate to computer security threats, and yes, you should pay attention to ...
The Computer Security and Privacy programs offer comprehensive knowledge in software security, network security, and computer privacy. The curriculum covers technical ...
Your computer’s mouse might not be as innocent as it looks – and one ransomware crew has a crisis of conscience that nobody saw coming. We talk about how something as ordinary as a web page could turn ...
Following two simple rules will make your home computer much safer. Roger Grimes lays out the facts on computer security for home and business computing. I frequently give talks about the current ...
When a new virus strikes, some of us might fall ill, some might die and others will survive. That’s the beauty of us each having a unique immune system. It’s a concept that the computer security ...
I should never be surprised at things related to government security efforts, but I did think the concept of hiring hackers was pretty much dead in government circles. Then comes the recent headline, ...
Evidence suggests that we do, but only to a certain extent, and typically only when it affects the bottom line Do we value better security? That’s a fair question. I know my readers do, but I’m ...
A good cyber security strategy should always start by defining what risk a business is willing to tolerate, and this is a task in which the IT security manager must involve their business colleagues.
After upstart hacker collective Lulz Security breached Sony Pictures user data last week and released the source code for the Sony Computer Entertainment Development Network on Monday, Sony has ...