Advertisement
-
INSIDER
-
Clubhouse app raises security, privacy concerns
-
Accellion file-sharing breach claims more Australian victims
-
-
Feature
-
Dependency confusion explained: Another risk when using open-source
-
CISO job search: What to look (and look out) for
-
-
How-To
-
How to protect Windows Remote Desktop deployments
-
How to defend against OAuth-enabled cloud-based attacks
-
-
Windows Security Tips
-
What you need to know about Microsoft’s Advanced Auditing
-
How to protect your network from OAuth-enabled cloud-based attacks
-
Clubhouse app raises security, privacy concerns
It’s got $100 million, loads of personal data, questionable privacy practices, and no CSO: What enterprise security needs to know before employees join hot new social app Clubhouse.
Chinese cyberespionage group hacks US organizations with Exchange zero-day flaws
Microsoft believes Chinese APT group Hafnium is using a set of previously unknown Exchange Server vulnerabilities to access mailbox contents and perform remote code execution.
Accellion file-sharing breach claims more Australian victims
Regulators, key agencies counting the cost as cybercriminals flaunt stolen data.
Advertisement
AustCyber creates centralised cybersecurity online shop
The not-for-profit advisory introduces AUCyberscape, where providers can list their products and services and customers can look for help.
Gootkit malware creators expand their distribution platform
Its Gootloader component infects computers by hijacking Google search results to send victims to legitimate but compromised websites where malware lurks behind links.
How to protect Windows Remote Desktop deployments
Attackers gain access to your Windows network just as work-from-home employees do: remotely. Following these simple steps will send them looking for easier targets.
Dependency confusion explained: Another risk when using open-source repositories
Dependency confusion is a newly discovered logic flaw in the default way software development tools pull third-party packages from public and private repositories. Here's what you need to know.
CISO job search: What to look (and look out) for
Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.
8 mobile security threats you should take seriously
Mobile malware? Other mobile security threats are more pressing. Every enterprise should have its eye on these eight issues.
IT Salary Survey 2021: The results are in
The latest Insider Pro and Computerworld Salary Survey reveals the current salaries for dozens of tech titles, the IT skills most in demand (and those not), the tech hiring expectations for the coming year, and what matters most to IT...
-
Research/Infographic
Sponsored -
-
White Paper
-
White Paper
Advertisement
IT Salary Survey 2021: Security and cloud computing certifications on the up
Do more certifications lead to new jobs, promotions or a pay rise? We asked 1,172 IT professionals their thoughts and whether or not they are currently pursuing certifications and in which areas of technology?
16 technology winners and losers, post-COVID
The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.
Cybersecurity Snippets
XDR is coming: 5 steps CISOs should take today
Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.
Security job candidate background checks: What you can and can't do
Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.
IT Salary Survey 2021: Over half of IT pros are satisfied at work – but nearly half are job hunting
Happy at work? Maybe you are not alone. Our 2021 salary survey of IT professionals reveals current attitudes to pay, responsibilities and what matters most in their current jobs.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by NTTTaking a Cold War approach to cybersecurity