Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Patch + update options  >  Pixelized tools + refresh symbol with branching paths
COVID-19 coronavirus structures are layered amid statistical models.

A woman carefully studying survey data.

How Australian IT security pros responded to the COVID-19 crisis

Australian organisations fared better than their Asia-Pacific and global peers in many indicators, but Aussies also have lower expectations for IT and security investments, a survey finds.

CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.

risk assessment - safety analysis - security audit

EU's DORA regulation explained: New risk management requirements for financial firms

The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.

Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.

ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.

Australia  >  Melbourne  >  Centre Place / streetscape / retail / shoppers / consumers / customers

Australian small businesses struggle with cybersecurity

University-linked survey highlights the difficulties small businesses face in understanding preventing, and remediating cyberattacks.

radar grid / computer circuits / intrusion detection / scanning

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

4 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

adrian ludwig 1200x800px

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

cloud security ts

Developing a multicloud security strategy

Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.

trojan horse malware virus binary by v graphix getty

From pranks to APTs: How remote access Trojans became a major security threat

A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victim’s computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

locked data / bitcoins

How to buy Bitcoin for ransomware payment (if you must)

Avoid paying ransom demands if at all possible. When you have no choice, follow this advice for acquiring cryptocurrencies and executing the transaction.

Team member extends all hands in for a huddle. [unity / teamwork / trust / diversity / inclusion]

Increasing diversity can plug Australia’s cyberskills gap

Eager cybersecurity staff are out there—if employers just give them a chance.

common negotiation errors2

5 best practices for negotiating SaaS contracts for risk and security

Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.