Features

substation transformers
1 threat intro

IT security engineer

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

glass ceiling executive

Despite the gender barriers, women must persist in cyber

Overcoming obstacles that challenge women from entering and staying in the security industry

emv payment primary

Is the rocky road to EMV retail adoption getting smoother?

Confusion and resistance to EMV abounded in 2015, but 2017 brings improvements in adoption and an ongoing evolution in the implementation of EMV-capable credit card readers.

marionette social engineering

6 of the most effective social engineering techniques

It takes a layered approach to technology and added protections and assurances for your people to fight social engineering.

magnifying glass contract

Want good cyber insurance? Read the fine print

Given the explosive growth of online threats, cyber insurance is becoming mandatory for most organizations. But the field is still new enough that buying an effective policy takes a lot of due diligence and attention to the fine print....

endpoint protection

10 must-ask questions for evaluating EDR tools

Are you thinking about investing in an endpoint detection and response solution? These pre-purchase questions will help you find the tool that meets your needs.

confusion decisions future misleading direction arrows

How to cope when mobile app development goes rogue

Business units often develop mobile apps on their own, turning to IT only when things go wrong. Better governance around business units and their mobile app demands can help alleviate the worst pain points.

continuous authentication

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

0 intro

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

01 farmers revenge

The IT equipment you can take into battle

If you're in IT, you're as familiar with your laptop and your cell phone as a farmer is with his tools. And just like Japanese farmers with their kama, you might find yourself using one of those tools in battle, for offense or...

phone picture conference

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though?

diy robot

Bots: Biggest player on the cybercrime block

Bot fraud cost an estimated $31 billion in the US last year, dwarfing the estimated $1 billion lost to ransomware and DDoS attacks.

hackers shadows group gang

Profiling 10 types of hackers

Understanding the different types of hackers that exist and what motivates them can help you to identify the attackers you are most susceptible to and properly defend yourself and your organization against cyberattacks.

accusation

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

video

How IT leaders create a culture of transformation

Computerworld's Premier 100 tech leaders share pointers on how to sell digital transformation within IT and across the organization (hint: say goodbye to hierarchies).

smart city pexels self-driving autonomous car

Cybersecurity engineer among the hottest IT jobs on the market

Live in or around one of the five largest metro areas in the U.S.? Here’s what you can expect to make in three of the hottest IT roles around.

01 light

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

bullseye hospital healhcare

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware.

Load More