Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

supply chain management problems in need of solutions

hand gestures / gesturing / talking / communicating / conversation

Communicate or die: Tech leaders who bring information security to life

3 engaging technology leaders, what makes them effective communicators and their tips for effective AI/cyber communication.

smarthome security

The home analogy – security redefined for the hybrid world

What we can learn from our home security evolution in our cloud security journey.

controling it costs

The potential costs of cybercrime that can’t be calculated

Cybersecurity risk often is treated as a nebulous, abstract concept. However, the possibility of attacks that start as cyber incidents but turn out to be a precursor to physical attacks are increasingly commanding more of our...

cybersecurity eye with binary face recognition abstract eye

Cybersecurity decisions that can’t be automated

Encourage those inside and outside your team to identify and challenge daily assumptions in order to adapt to change, think differently and make smarter, faster security related decisions.

woman holding up 5 fingers number 5 top five

5 best practices for securing your applications

As you begin to look for ways to secure both your legacy and new applications, consider a container platform to ensure your organization is aligned with best ways to keep your business-critical applications out of harm’s way.

green bottle with money inside save message in a bottle

Getting the most out of your security budget

There may be no more pressing need in today’s online world than quality cybersecurity. With such a limited budget, it’s crucial to prioritize purchases that will give your organization the greatest return on your investment.

race compet starting sucess leader prepar challenge

Start preparing today for the future of quantum computing

With so many issues competing for an IT security professional's time, it’s difficult to find time for future planning. That being said, now is the time of professionals to have quantum computing on the radar.

number 4 four with binary grunge background

4 frameworks you need to protect your digital enterprise against the latest cybersecurity threats

Cybersecurity attacks are getting vicious, expensive and bringing entire businesses to their knees. CIOs and CISOs don’t have time to reinvent the wheel and should adapt US Government and Department of Defense lighthouse frameworks...

eliminate insider threats 1

The hidden security problem we all need to know about

If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.

team of hackers / organized attack / group of threat actors

It’s time to get off the treadmill: Why you should understand adversary playbooks

Flipping the equation on known adversaries by developing and deploying controls at locations on the intrusion kill chain designed specifically for these known playbooks will increase a company’s ability to block an attack. The...

Black Hat 2015

The CSO guide to top security conferences, 2018-19

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

monday

Why monday.com Is The Universal Team Management Tool for Your Team

This platform is perfect for teams sized at 2 to 200 — and gives every employee the same level of transparency.

orange monitors with lock icon network security cyber threat

The thin host to serverless model is radically realigning your security responsibilities

This is good news as infrastructure and network security oversight transfers to your cloud provider.

shadowy attacker hooded

Attacker attribution is hard, but sometimes easier than you think

Attribution of an attacker, and uncovering his or her true identity, remains a vexing problem for incident response teams. But in certain cases, it can be solved. Advanced telemetry and geofencing technologies offer the potential to...

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

Improving access certification processes makes life easier for business users. But that’s not the point

When you do everything possible to make access certifications easier, you’re not just doing business users a favor. You’re improving the security posture of the entire organization.

creepy teacher chalkboard wolf

Complying with emerging privacy regulations: sometimes you need a silver cannonball

With GDPR compliance and other privacy regulations around the world in 2018, no small, simple solution exists.

9 screen locking device lock down authentication

The behavioral economics of authentication

Organizations can now implement authentication technologies that improve security and user experience. Consumers just need some nudging to follow along.

1 intro security executive thinking woman face binary

Stop playing “whack-a-mole” with your security

Google does it, so can you. Stop dealing with IT security problems when they happen; start addressing the root cause.

Load More