Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

network security hacker virus crime
Black Hat 2015

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

intel primary

The federal privacy bill: Intel gets the ball rolling

As momentum builds to pass a federal privacy bill, corporate behemoth Intel has drafted a bill palatable to tech giants. But will politicians take the bait?

danger lurking in mobile binary code

Why hacking leads to less security respect

If security and risk management continue to be marketed as tools that aren't necessarily complementary to an organization’s strategy, they will continue to be seen as outsiders.

red number 7 on white wall top seven

7 security trends to watch in 2019: More AI, consolidation and regionalization

It’s that time of year again, when we look back to look ahead. The 2019 security landscape holds new promise, threats, developments and opportunities to collectively tackle the issues our industry faces.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

square peg round hole no fitting bad idea

The end of security as we know it

Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

supply chain management problems in need of solutions

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

template c100.00 04 14 02.still001
video

Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

Facebook and Google recently acknowledged data breaches affecting millions of users. This won't be the last time that happens. CSO's J.M. Porup and Computerworld's Ken Mingis examine what's really going.

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

smarthome security

The home analogy – security redefined for the hybrid world

What we can learn from our home security evolution in our cloud security journey.

controling it costs

The potential costs of cybercrime that can’t be calculated

Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

green bottle with money inside save message in a bottle

Getting the most out of your security budget

There may be no more pressing need in today’s online world than quality cybersecurity. With such a limited budget, it’s crucial to prioritize purchases that will give your organization the greatest return on your investment.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

eliminate insider threats 1

The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.

Load More