Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

ransomware attack
access control / authentication / privileges / security / key

IPv6 wireless network protocol

7 points your security team needs to know about IPv6 (but probably doesn't)

The IPv6 protocol affects the security of your network even if you haven't deployed it internally. Here are the most important points every security team needs to understand about the protocol.

A laptop with a virtual overlay of abstract code and a binary skull.

Protecting high-value research data from nation-state attackers

Recent nation-state campaigns to steal COVID-related research data underscores the threat to all research organizations. The best defense starts with knowing the enemy.

handshake

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?

A hand holds a lightbulb swathed in leaves and surrounded by symbols of renewable energy.

Solar power shines light on security for the renewable energy industry

Solar power plants have massive numbers of vulnerable internet-connected devices. It's recent focus on cybersecurity is awakening the rest of the renewable energy industry to the threat.

Binary code data flows through the cracked seal of a vault.

John the Ripper explained: An essential password cracker for your hacker toolkit

One of the oldest password cracking and testing tools, John the Ripper is still an essential pen testing tool.

binary target

5 tips to protect legacy applications on Windows networks

You're probably running legacy applications somewhere, and attackers see them as vulnerable targets. This advice will harden legacy apps against threats.

A hand moves a pawn through a conceptual maze of circuits. [navigating/negotiating/strategy/tactics]

10 essential negotiation tactics CISOs should know

Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts.

A macro shot at the pixel level of a browser displays 'https' and a glowing lock in the address bar.

6 ways HTTP/3 benefits security (and 7 serious concerns)

HTTP/3 brings improved performance and reliability, along with various security and privacy benefits, but there are some noteworthy challenges.

CIO | Middle East  >  A woman uses a mobile phone amidst abstract binary data and processing arrows.

Want better mobile security or privacy? Try these Android and iOS alternatives

GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.

Tools + binary code

10 (more) free security tools worth a look

Security pros have a lot to juggle, but look in the right places and you can find invaluable assistance for free.

A digital bomb with lit fuse in an environment of abstract binary code.

Brute-force attacks explained, and why they are on the rise

The surge in remote work has rekindled interest in brute-force attacks, but a few simple steps can make your organization less of a target for them.

A laptop user works securely behind a firewall.

How to optimize Windows Firewall security

If you're ignoring or have disabled Windows Firewall, you might be missing out on some good, basic protections that are easy to set up and maintain.

Recruitment  >  Hiring compass pointing toward talent

Rethinking security hiring: How COVID-19 is changing talent acquisition

Staffing needs remain high, forcing companies to adapt their recruiting and onboarding practices — often for the better.

COVID-19 coronavirus pandemic data tracking

10 security changes post-COVID-19

CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.

5G mobile wireless network technology

8 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these eight areas before you deploy your own.

A hacker attacks from within a Windows system.

The most important Windows 10 security event log IDs to monitor

Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.

rotating square frames around a bridge path / future / change / transformation

Why frameworks are more necessary than ever for secure enterprise transformations

Taking governance shortcuts in order to quickly take advantage of competitive opportunity can lead to major failings when it comes to security and privacy and cause serious long-term damage to the business.

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.

Load More