Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Quantum computing / security
binary code spanning a world map

asia fom space night shutterstock 1422245984

The state of privacy regulations across Asia

While GDPR looms large across the Asia-Pacific region, there are significant differences as jurisdictions develop their own national approaches to privacy. There’s also a growing focus on data security in many countries.

abstract arrows direction process magnifying glass search investigate

Use zero trust to fight network technical debt

Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

IBM service aims to secure multicloud operations

IBM’s new Unified Key Orchestrator lets customers integrate multiple security key-management systems into a single managed service that spans hybrid and multicloud environments.

network security / network traffic scanning

Lessons learned from 2021 network security events

Rather than predict what 2022 will bring, let's manage the future by implementing the lessons learned from this year's biggest security threats.

storytelling primary

How CISOs can drive the security narrative

If you want people to follow proper security practices, they need to understand why. That's best done by telling a good story.

Outdated, obsolete computer systems in need of updating display binary code.

Your Microsoft network is only as secure as your oldest server

It's time to inventory your network to identify systems to replace or migrate away from.

CSO  >  malware / security threat

Malware variability explained: Changing behavior for stealth and persistence

More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.

Microsoft Windows  >  Defending against attacks

Microsoft announces new security, privacy features at Ignite

Microsoft has consolidated some security tools under the Defender brand and added security and privacy features and products. Here's a look at what's new.

security detection monitoring

Will XDR modernize the SOC?

Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives.

Microsoft Windows  >  Defending against attacks

Why small businesses should consider Microsoft Defender for Business

Defender for Business brings EDR and threat monitoring features found in more expensive Windows licenses to smaller organizations.

Encryption  >  Encrypted data / hexadecimal code

Spike in encrypted malware poses dual challenge for CISOs

Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.

Rich Agostino, SVP and Chief Information Security Officer, Target [2020]

How Target's CISO balances customer security and customer experience

In wake of a 2013 data breach, Rich Agostino rebuilt Target’s approach to cybersecurity, addressing vulnerabilities while maintaining a user-friendly web presence for customers.

Cryptojacking  >  Binary skull, code and bitcoin symbols invade systems as malware

How to spot and block cryptominers on your network

Cryptominer malware is stealthy and drags down network and device performance. Some simple tasks and basic tools can minimize its impact.

Conceptual image of a password amid hexadecimal code.

4 tools to prevent leaks in public code repositories

Use these tools to find your company's exposed secrets in repositories such as GitLab, GitHub, or Google Cloud Build before attackers do.

risk assessment - safety analysis - security audit

Why are people so bad at risk assessment? Blame the brain

Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.

timbrown solarwinds ciso 3x2

SolarWinds CISO: Know your adversary, what they want, watch everything

The compromise of SolarWinds' Orion software changed the company's approach to security. Tim Brown shares some hard-won advice for how CISOs and software vendors should prepare for supply chain attacks.

please stand by problem technical difficulties tv mistake test screen by filo getty

Facebook outage a prime example of insider threat by machine

A buggy automated audit tool and human error took Facebook offline for six hours. Key lesson for CISOs: Look for single points of failure and hedge your bets.

Antivirus / virus alert / warning / security threats / protection from attack

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.