CSO Magazine is turning up the heat on cybersecurity, diving into reviews of the latest cyber defenses in critical categories as part of a summer reviews blitz. Find out how the latest products in deception, microsegmentation, network traffic analysis and others stack up.
A new type of environmentally aware malware knows how to look for key indicators to prove that its running inside a sandbox. The Minerva tool we tested for CSO Magazine actually feeds it those prompts, tricking the malware to sleep or kill itself.
We tested the Netgear ReadyNAS 314 for BizTech, finding a sturdy workhorse for file storage, that also automatically squashed bugs before they could be permanently written.
A new breed of threat is taking a different approach, setting up fake websites and apps that appear to be legitimate, but can be extremely dangerous to anyone fooled into trusting them. NextGov investigates those threats aimed at the United States Postal Service.
This week in NextGov’s emerging tech column, find out how a hyper-violent videogame that the government has tried to ban, is now an ally helping to train driverless vehicles in all sorts of crazy conditions.
The latest NextGov Emerging Tech column takes a look at several states that are supporting new driverless vehicle programs, and discovers the places where tractor trailers without drivers will soon be hitting the roads.
New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. Network World asked TWB author John Breeden II to test out several manager programs designed to focus the chaos of a typical firewall deployment.
The innovative integrators at InfoZen know how to modernize IT for government agencies. The TWB recently interviewed their experts to create an amazingly detailed guide about how to modernize IT systems in the key areas of Cloud, DevOps, Cybersecurity and Mission Critical IT.
We wanted to see if the alleged hacking tools the CIA is supposedly using did in fact exist, or if doing things like turning TVs into spy devices was possible. So we loaded up some hacking tools and went to work. Find out what happened next.
What if there was a different way to look at security? Instead of searching for behaviors that might indicate a threat, what if you could tightly define everything that was allowed within a network? Varmour does that. It’s called segmentation, and is the subject of a Network World Clear Test review.