IT Strategy

IT Strategy | News, how-tos, features, reviews, and videos

security threats and vulnerabilities
young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Don’t let the coronavirus make you a home office security risk

Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.

COVID-19 coronavirus [abstract concept]

Post-coronavirus planning calls for more (not less) investment in tech

The coronavirus crisis is just beginning. But it will end. And how you fare after the pandemic depends on what you do right now. Here are four areas to focus on.

Coronavirus (COVID-19)

Coronavirus: What companies are ready for our new reality?

One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...

coronavirus closed for business surgical mask bby tim mossholder via unsplash .artistgndphotographe

What your business can do about the coronavirus ... right now

The Covid-19 crisis is the Black Swan event of our lifetime. Here's how to hold it all together (while keeping employees apart).

telecommuting corona virus surgical mask remote worker 5g wi fi by mediaphotos getty images and wyn

How the coronavirus is changing tech and 5 things to do about it

Due to the Covid-19 virus, some tech-culture trends are radically accelerating. Others are being reversed. And it's happening all at once. Here's what you need to know.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

Chain links secure multiple data stream segments.

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

crystal globe with binary code

Is technology killing globalization?

What you need to know -- and do -- about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

Next-generation endpoint security goes beyond the endpoint

AI and behavioral analysis are key to elevating the level of security for devices and back-end systems and are a prerequisite for IoT devices and services. Is your vendor moving in the right direction?

A businessman walks through a keyhole-shaped doorway into field of question marks.

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

security automation robot protects defends from attack intrusion breach

Review: LogicHub expertly automates security

It’s not only highly effective at diagnosing and countering threats, but it does so in a transparent way that is configurable and editable by users.

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you're looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

cyber threat security compromised vulnerable men on the street

Cybersecurity in 2020: Vigilance and the human element

Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in...

Load More