Advertisement

Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]
Cybersecurity Snippets

Is Cybersecurity Awareness Month worth it?

Cybersecurity awareness month has never gained traction beyond academia and the public sector. It’s time for all parties to commit or quit.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


cybersecurity controls

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that.


Advertisement

human weak link cybersecurity primary

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.


Insider Pro | Computerworld  >  IT Salary Survey 2021

Take part in the 2021 IT Salary Survey

Whether you’re scouting out a new job or looking to fill a key IT role, access to salary data is an important tool. Help us help you by taking our 10-minute IT Salary Survey.


CSO Executive Sessions [podcast logo]
CSO Executive Sessions

Episode 14: How COVID-19 changed security priorities at Bristol Myers Squibb

Jerry Roberts, director of corporate security at Bristol Myers Squibb, joins host Bob Bragdon for a wide-ranging discussion on COVID-19's impact on security, the greatest cybersecurity challenges today, and how Roberts's 20-year...


Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.


Strategic world map to certification in a binary world.

CISM certification guide: Requirements, prerequisites, and cost

Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.


A broken link in a digital chaing / weakness / vulnerability

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available.


mentor teach learn office computer

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.


Advertisement

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.


gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.2 billion and counting.


many keys on a series of keychains / key rings / binary code overlay / password management

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure.


Ransomware  >  A masked criminal ransoms data for payment.

US Treasury Department ban on ransomware payments puts victims in tough position

The Treasury Department's advisory warns companies not to pay ransoms to sanctioned entities. The move complicates ransomware incident response and might encourage insurance carriers to drop ransomware coverage.


Microsoft Windows security  >  Windows laptop + logo with binary lock and key

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.