Features

H-1B visa Statue of Liberty America
walking dead cloud zombies apocalypse

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

office freelancer computer business

Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.

handsome male executive holding finger up to be quiet keep a secret

How to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?

fbi agent laptop

Privacy for everybody means privacy for pedophiles

The so-called Playpen cases – which arose from the FBI running a child porn website as a sting operation – has prompted an intense debate over the Fourth Amendment’s protections from “unreasonable” search and seizure.

security consultant cover

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.

jumpstart jumper cables

How to jumpstart your infosec career

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

pulling companies apart chain broken

How secure is your supply chain?

If you're like many organizations, your security focus is on protecting email, financial data and customer data. What if your greatest threats come from your vendors and supply chain?

data security strategist

What it takes to become a data security strategist

Data security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT inititiatives pours into enterprises.

dragon statue head

Can AI and ML slay the healthcare ransomware dragon?

Healthcare is well known as “low-hanging fruit” for ransomware attacks. But according to some experts, artificial intelligence and machine learning, as part of a “layered” security program, can make them a much more difficult target.

ciso cover

What it takes to become a chief information security officer (CISO)

A CISO typically has a technical information security or IT risk background, but the path that leads to the role can vary greatly. Here’s how one CISO landed his first job in the position.

secsysadmin cover

What it takes to become a security systems administrator

There are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification.

twitter logo eyeball

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to...

board ceo executives table

What C-level leaders need to know about cybersecurity

Corporate boards are rarely prepared for cyberattacks -- and when they occur everybody likes to point fingers at everyone else.

iot

Realistic ways to lock down IoT

How CSOs can best secure and understand IoT devices that enter their organization's network infrastructure

robot vacuum

Robots: Lots of features, not much security

Robotics is one of the fastest-growing components of the IoT. It can also be one of the more dangerous, if taken over by hackers. And given the level of vulnerabilities in them, that is a clear and present risk.

1 one true path

Infosec careers: There is no one true path

It would sure make things simple if there were one easy and obvious way to get a job or start a successful business in IT security. But it would also cut off a lot of potential career paths. We spoke to a host of different IT security...

kevin mitnick

Cousin Kevin Mitnick, entrepreneur

Kevin Mitnick, entrepreneur and hacker, KnowBe4, chief hacking officer

Load More