Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

digital data surveillance eye
Computer monitor with pixelated locks for security breach

bug bounty

Why you need a bug bounty program

If you’re ready to deal with the volume of reports, a bug bounty program can help you can find the holes in your system — before attackers do.

red blue tools

5 open source security tools too good to ignore

Look to these clever open source tools to keep secrets out of source code, identify malicious files, block malicious processes, and keep endpoints safe

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

connected nodes network

Understanding the attack surface to better allocate funds

How CISOs can be better informed and get ahead of attacks

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

smartphone shocked group

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

bodium castle fortress

How Google reinvented security and eliminated the need for firewalls

In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter. ...

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

H-1B visa man entering U.S. with briefcase

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with...

insurance

Learn how to get a rate cut on your cyberinsurance

Companies with optimized Microsoft Office 365 security settings may qualify for lower cyberinsurance rates through The Hartford.

secret public domain

Secrets of successful CISOs [Infographic]

Who the CISO reports to matters more than you might think, but it isn’t the only secret to success.

Unusual Interview Questions

Quarter of firms can't fill open infosec positions

The information security industry hasn't made any significant strides in addressing the workforce shortage, according to a report released this morning by ISACA.

gary hayslip san diego 1

How San Diego fights off 500,000 cyberattacks a day

San Diego has a huge range of technologies to support and secure, from legacy apps to smart city devices. Learn how the city’s security team is eliminating blind spots, prioritizing threats, and reducing exposure and loss.

blame

IT and C-level leaders point fingers at each other over cyber defense

C-level execs need to bring themselves up to speed on cyber threats, some analysts say.

cso50 intro

CSO50 2017: 50 forward-thinking security projects

The annual CSO50 conference in May will showcase cutting-edge technologies.

cso50 intro

CSO50 2017: A step ahead of the threats

The CSO50 awards honor innovative security projects that demonstrate thought leadership and outstanding business value.

cso50 intro

CSO50 2017: IACI's neighborhood watch is a new approach to information sharing

The federal government for years has advocated that cyberthreat information-sharing is the key to faster identification and remediation of attacks. The challenge was to make once-taboo information sharing more inviting to the private...

salary rising primary

CISOs rank third in top-paying tech jobs

Which IT roles earn the biggest salaries? Thirteen tech jobs can pull in salaries of $200,000 or more, according to new data from IT staffing firm Mondo.

Load More