Neal Weinberg

Contributing writer

Neal Weinberg is a freelance technology writer and editor. He can be reached at neal_weinberg@idg.contractors.

Best and worst data breach responses highlight the do's and don'ts of IR

PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules

PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules

New credit card payment processing rules will tighten security and offer more flexibility for enterprises. While they won’t come into full effect until 2025, experts say there are significant changes and recommend that consumer-facing...

AWS, Google Cloud, and Azure: How their security features compare

AWS, Google Cloud, and Azure: How their security features compare

Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.

7 hot cybersecurity trends (and 2 going cold)

7 hot cybersecurity trends (and 2 going cold)

Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.

13 traits of a security-conscious board of directors

13 traits of a security-conscious board of directors

A CISO's success (and job longevity) is often dependent on support from the board of directors. Answers to these questions will reveal how security savvy a BoD is.

6 zero trust myths and misconceptions

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

5 steps toward real zero trust security

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

Consumers are done with passwords, ready for more innovative authentication

Consumers are done with passwords, ready for more innovative authentication

Surveys indicate that consumers are becoming more open to biometrics and multi-factor authentication.

The 10 most powerful cybersecurity companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

Business continuity and disaster recovery planning: The basics

Business continuity and disaster recovery planning: The basics

Good business continuity plans will keep your company up and running through interruptions of any kind: power failures, IT system crashes, natural disasters, pandemics and more.

Top 7 weirdest, meanest and dumbest hacks of all time

Top 7 weirdest, meanest and dumbest hacks of all time

Hackers have used some strange ways to break into networks or commit fraud. Not all are clever or smart.

6 hard truths security pros must learn to live with

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.

Load More