Insider
Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!
Your Microsoft network is only as secure as your oldest server
It's time to inventory your network to identify systems to replace or migrate away from.
How CISOs can drive the security narrative
If you want people to follow proper security practices, they need to understand why. That's best done by telling a good story.
Malware variability explained: Changing behavior for stealth and persistence
More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.
Microsoft announces new security, privacy features at Ignite
Microsoft has consolidated some security tools under the Defender brand and added security and privacy features and products. Here's a look at what's new.
Will XDR modernize the SOC?
Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives.
Competing security priorities are challenging ‘frazzled’ Australian CISOs
Cybersecurity literacy, not technology, is the biggest headache for security leaders.
Why small businesses should consider Microsoft Defender for Business
Defender for Business brings EDR and threat monitoring features found in more expensive Windows licenses to smaller organizations.
Spike in encrypted malware poses dual challenge for CISOs
Faced with a surge in malware hidden in encrypted traffic, CISOs are being tasked with managing technical solutions while also adhering to privacy considerations.
How Target's CISO balances customer security and customer experience
In wake of a 2013 data breach, Rich Agostino rebuilt Target’s approach to cybersecurity, addressing vulnerabilities while maintaining a user-friendly web presence for customers.
E-government: Australia experiences the risks while seeking better digital identity methods
Not all government services are handling citizen credentials well even as digital services grow, but Services Australia is working to change that.
4 tools to prevent leaks in public code repositories
Use these tools to find your company's exposed secrets in repositories such as GitLab, GitHub, or Google Cloud Build before attackers do.
How to spot and block cryptominers on your network
Cryptominer malware is stealthy and drags down network and device performance. Some simple tasks and basic tools can minimize its impact.
Why are people so bad at risk assessment? Blame the brain
Stakeholders and CISOs tend to have different perspectives on estimating the risk of a potential cybersecurity incident. Understanding the psychological aspects can help bridge the gap.
SolarWinds CISO: Know your adversary, what they want, watch everything
The compromise of SolarWinds' Orion software changed the company's approach to security. Tim Brown shares some hard-won advice for how CISOs and software vendors should prepare for supply chain attacks.
Facebook outage a prime example of insider threat by machine
A buggy automated audit tool and human error took Facebook offline for six hours. Key lesson for CISOs: Look for single points of failure and hedge your bets.
NSW agencies fear cyberattacks after report finds ‘significant weaknesses’
The nine state government agencies audited asked the auditor general to not report the findings to Parliament, fearing it would expose weaknesses to cyberattackers.
How to configure Microsoft Defender for cloud-based attacks
Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.
How software reliability can help drive software security
Adopting both devsecops and site reliability engineering concepts increases software availability and security by improving stability and shortening time to implement fixes.
How the skills shortage puts Australia at risk of cyberattacks
The skills shortage in cybersecurity means professionals in the area have less time to spend on configuring systems properly, increasing the chances of cybersecurity incidents. Here’s what can be done.
Conti ransomware explained: What you need to know about this aggressive criminal group
The Conti ransomware group is less likely to help victims restore encrypted files and more likely to leak exfiltrated data.
Become An Insider
Sign up now and get FREE access to
hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content.
Learn more.
BrandPosts
Learn more-
Sponsored by Netscout
-
Sponsored by Fortinet
-
Sponsored by Palo Alto