Quantcast
Channel: CSO Online JD Sartain
Browsing all 23 articles
Browse latest View live

How to fight back against privacy pirates

Have you Googled yourself lately? Is the information about you accurate or full of inconsistencies, both of which can be devastating?Accurate information that you'd rather be kept private can be used...

View Article



Feds cracks down on data brokers

J. Elizabeth Hill, a nurse living in San Diego, recently received a Gmail message from her nephew. Pasted inside was an article about soldiers in Afghanistan and the discrepancies regarding the...

View Article

Why disaster recovery planning can save lives

From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover...

View Article

Image may be NSFW.
Clik here to view.

13 must-have security tools

Security toolsNetwork World asked security pros to name their No. 1, must-have, go-to security tool. We received responses from industry analysts, enterprise security practitioners, academics, and...

View Article

Top security tools in the fight against cybercrime

Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1,...

View Article


Does quantum cryptology offer hack-proof security?

Untangling hyper-entangled twisted light. Photons in the form of a bi-photon frequency comb. Quantum-powered random numbers generated by an entropy engine that exploits quantum mechanics. Quantum...

View Article

In the wrong hands, drones can be life-threatening

Everyone is familiar with the military use of drones. You’ve probably heard about Amazon’s plans to deliver commercial goods to consumers via drones. And Google is reportedly developing solar-powered...

View Article

Security among the hot jobs of the future

"Roughly 50 percent of all the jobs on the planet will disappear by the year 2025," predicts futurist Thomas Frey, founder of the DaVinci Institute think tank.To read this article in full or to leave a...

View Article


Top 5 tools to protect internet privacy

Years ago when Google, Bing, Yahoo, Facebook, Amazon, and hundreds of other organizations began harvesting and monetizing user data, the public outcry resulted in a multitude of internet privacy...

View Article


Why disaster recovery planning can save lives

From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover...

View Article

Image may be NSFW.
Clik here to view.

13 must-have security tools

Security toolsNetwork World asked security pros to name their No. 1, must-have, go-to security tool. We received responses from industry analysts, enterprise security practitioners, academics, and...

View Article

Top security tools in the fight against cybercrime

Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1,...

View Article

Does quantum cryptology offer hack-proof security?

Untangling hyper-entangled twisted light. Photons in the form of a bi-photon frequency comb. Quantum-powered random numbers generated by an entropy engine that exploits quantum mechanics. Quantum...

View Article


In the wrong hands, drones can be life-threatening

Everyone is familiar with the military use of drones. You’ve probably heard about Amazon’s plans to deliver commercial goods to consumers via drones. And Google is reportedly developing solar-powered...

View Article

Security among the hot jobs of the future

"Roughly 50 percent of all the jobs on the planet will disappear by the year 2025," predicts futurist Thomas Frey, founder of the DaVinci Institute think tank.To read this article in full, please click...

View Article


Top 5 tools to protect internet privacy

Years ago when Google, Bing, Yahoo, Facebook, Amazon, and hundreds of other organizations began harvesting and monetizing user data, the public outcry resulted in a multitude of internet privacy...

View Article

Why disaster recovery planning can save lives

From Katrina to Sandy, tornadoes in the planes, flooding in the south, wildfires throughout the West, natural disasters threaten our world with destruction every year. The cost to rebuild and recover...

View Article


Image may be NSFW.
Clik here to view.

13 must-have security tools

Security toolsNetwork World asked security pros to name their No. 1, must-have, go-to security tool. We received responses from industry analysts, enterprise security practitioners, academics, and...

View Article

Top security tools in the fight against cybercrime

Cybercrime is a massive global threat, and U.S. businesses are the No.1 target. For tips and advice about how best to defend against cyberattacks, Network World asked security pros to name their No.1,...

View Article

Does quantum cryptology offer hack-proof security?

Untangling hyper-entangled twisted light. Photons in the form of a bi-photon frequency comb. Quantum-powered random numbers generated by an entropy engine that exploits quantum mechanics. Quantum...

View Article
Browsing all 23 articles
Browse latest View live




Latest Images