Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

wrestlers fighting
spider web assembly public domain

network traffic

Patrolling network traffic with SecBI

SecBI's new software aims to eliminate two of the problems with using traffic analysis in cybersecurity: volume processing of data for actionable threat intelligence and a reliance on network trapping hardware. Here's how it works.

faceoff face-off hocket

Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security

Important criteria to consider when evaluating or choosing a database security solution include customization capabilities, reporting features, database discovery, vulnerability management, and database auditing, among others. Here's...

secure container java box circuitry

Container security: How Waratek blocks Java exploits

Waratek's unique approach to container security relies on just-in-time compiling and focuses exclusively on one of the biggest security risks within most organizations: applications running Java.

State of Cybercrime 2017: Security events decline, but not the impact

Even as the average number of security events dropped year-over-year, events that resulted in a loss or damage rose, and fewer companies reported no losses.

cloud security

Lacework unmasks hidden attackers amid data center and cloud chaos

Managing even a local data center is a tough job. Keeping a cloud secure is even more difficult. Lacework helps to filter all the chaos, removing false positives, and generating actionable threat intelligence in real-time for IT teams...

Mobile security

SandBlast Mobile simplifies mobile security

Check Point's SandBlast Mobile fits in between mobile device managers and security event log analyzers, and actually makes it easier to manage the overall security footprint of your entire mobile device fleet.

dark web hacker tablet malware

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

pc antivirus

Review: Minerva protects endpoints with trickery and deception

Minerva's Anti-Evasion Platform targets the new breed of environmentally-aware malware. The idea is that most normal threats will be blocked by traditional antivirus and Minerva will stop anything that attempts to get around that...

network security primary2

RedSeal offers powerful, passive network protection

The RedSeal appliance doesn't actually fix anything on its own, but it does act as a force multiplier for every other security device within a network.

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

green paper glasses with fake black paper mustache

Tested: How 4 deception tools deliver truer network security

Modern deception platforms lay traps that point attackers to fake assets that are created by the deception product. Here's what we discovered about how deception works and the unique features that deception tools from TrapX Security,...

careertracker malware primary

What it takes to be a malware analyst

The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.

trend arrow up calendar

Don’t like Mondays? Neither do attackers

You can reduce potential damage by paying attention to when attackers are most likely to strike.

man standing out crowd individual

Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

security software programmer primary

What it takes to be a security software developer

Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications.

black white hat

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

magnifying glass contract

Contract obligations, third parties and cyber insurance

John Southrey from the Texas Medical Liability Trust explains what you need to understand about third-party contracts and cyber insurance to make better decisions.

CISOs

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

Load More