Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

cloud security
Mobile security

dark web hacker tablet malware

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

pc antivirus

Review: Minerva protects endpoints with trickery and deception

Minerva's Anti-Evasion Platform targets the new breed of environmentally-aware malware. The idea is that most normal threats will be blocked by traditional antivirus and Minerva will stop anything that attempts to get around that...

network security primary2

RedSeal offers powerful, passive network protection

The RedSeal appliance doesn't actually fix anything on its own, but it does act as a force multiplier for every other security device within a network.

Hacking stealing password data

Two years after the OPM data breach: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

green paper glasses with fake black paper mustache

Tested: How 4 deception tools deliver truer network security

Modern deception platforms lay traps that point attackers to fake assets that are created by the deception product. Here's what we discovered about how deception works and the unique features that deception tools from TrapX Security,...

careertracker malware primary

What it takes to be a malware analyst

The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.

trend arrow up calendar

Don’t like Mondays? Neither do attackers

You can reduce potential damage by paying attention to when attackers are most likely to strike.

man standing out crowd individual

Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

security software programmer primary

What it takes to be a security software developer

Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications.

black white hat

How computer security pros hack the hackers

If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.

magnifying glass contract

Contract obligations, third parties and cyber insurance

John Southrey from the Texas Medical Liability Trust explains what you need to understand about third-party contracts and cyber insurance to make better decisions.

CISOs

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire.

target ciso primary

Target's data breach settlement sets a low bar for industry security standards

Target’s multistate data breach settlement over its 2013 data breach outlines the kind of security measures enterprises should have in order to not be found negligent with customer data. The problem is, the settlement doesn’t go far...

patching against ransomware
Q&A

How Cisco combats fast-maturing cybercrime networks

As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.

handshake

Why security leaders need to partner with their insurance companies

Garin Pace shares how security leaders can partner with their insurance companies to get better results

6 reasons chip hacks will become more popular

Code embedded in hardware has vulnerabilities and it's harder to patch. That will make it a target for hackers.

car salesman auto dealer keys

Cybersecurity pros pushed into sales roles

It has gotten to the point that besides trying to secure the product, companies are asking their security pros to explain and sell the product to prospective clients.

help support advice guidance signpost

What security leaders need to know about cyber liability insurance before a breach

Shawn Tuma talks about how security leaders can get the most out of their cyber liability coverage in the event of a breach

Load More