Remote Work

Remote Work | News, how-tos, features, reviews, and videos

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 2: Empowering employees to be secure and productive

Remote worker  >  A man works from home with his dog

coronavirus remote worker work from home romolotavani getty

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for...

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

How to do remote deployments of Windows systems securely

Windows 10 provides a few options including Autopilot and AppLocker to securely and remotely deploy Windows devices and harden them against attack.

Christina Quaine, CISO, SVP Technology Operations, AvidXchange, Inc.

CISO Q&A: How AvidXchange manages COVID-related threats and risk

Like many CISOs, Christina Quaine's team is supporting the payment processor's work-at-home employees and managing internal pandemic-specific risks. It also helps its mid-market customers meet new security challenges.

remote workers larger talent pool

Q&A: Box CEO Aaron Levie looks at the future of remote work

Once a company focused on cloud-based file-sharing, Box now offers features to support remote productivity and teamwork. CEO Aaron Levie talks about his company's evolution – and how the workplace continues to change.

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

Update: Coronavirus prompts collaboration tool makers to offer wares for free

Several vendors, including Microsoft, Google, Slack, Zoom, Cisco and LogMeIn, are making chat, videoconferencing and other collaboration services free as demand for remote working booms.

video conferencing / remote work / online meeting

Review: 5 top videoconferencing services put to the test

We compared Zoom, Cisco Webex, Microsoft Teams, GoToMeeting, and Google Meet in real-world tests to see which videoconferencing platforms perform best for business users. Here’s how they stack up.

tech spotlight collaboration ctw intro by  ipopba 887088424 3x2 2400x1600

Collaboration answers the call

When office workers fled to their homes, collaboration tools and methods suddenly became indispensable. Here's what our new era of collaboration may look like.

tech spotlight collaboration ctw by fotogestoeber gettyimages 1071228974 3x2 2400x1600

Remote working, now and forevermore?

Employees around the world are suddenly working from home full-time. Find out how to make the new WFH reality work for your organization, whether it will last beyond the pandemic, and where it might take us.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The CSO identity management survival guide

This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.

Load More