Features

Windows security and protection [Windows logo/locks]
cloud security

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

money case ransom hundreds

7 best practices for negotiating ransomware payments

Sometimes companies are forced to meet cyber criminals’ ransom or extortion demands. This advice will give you your best chance to get your data back and preserve your reputation.

Microsoft Windows 10 logo bandage data map

Best new Windows 10 security features: More patching, updating flexibility

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1809 feature release.

hand holding magnifying glass over contract

What are blockchain’s smart contracts? And how to secure them

Smart contracts are moving into the enterprise, but they aren’t bulletproof. These are the vulnerabilities and best practices for securing them.

thumbnail
video

CIO Leadership Live with Sreelakshmi Kolli, CIO of Align Technology | Ep 15

In this episode, host Maryfran Johnson talks with Sreelakshmi Kolli, CIO of Align Technology, about how the orthodontics provider is attracting top IT talent and using emerging technologies such as blockchain and 3D printing to expand...

sequence 01.00 01 38 43.still002
video

CEC Power Hour: Organizing for Digital with Martha Heller

Host Martha Heller discusses the challenges and opportunities in organizing the enterprise for digital transformation with her guests Dave Castellani, SVP, Business Information Officer at New York Life Insurance, and Kim Snipes, CIO...

pc antivirus

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

security vulnerabilities / risk assessment

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

Artificial intelligence and digital identity

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

cybersecurity startup tablet with rocket lifting off startup

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

template c100.00 00 03 13.still009
video

IDG CMO Perspectives: Loren Jarrett, Chief Marketing Officer, Progress

Loren Jarrett, CMO of Progress, has assembled a team of “doers” to help create the “best-next” experience for customers. In a conversation with Rob O’Regan, global content director with IDG Communications, Loren details how her team...

wrenches in different sizes / an iterative process of development or repair

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges.

hand holding paper cloud for google cloud logo

SQL injection explained: How these attacks work and how to prevent them

There are several types of SQL injection, but they all involve an attacker inserting arbitrary SQL into a web application database query. The good news? SQLi is the lowest of the low-hanging fruit for both attackers and defenders.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

The Options Clearing Corporation taps AI to stay ahead of hackers

OCC uses machine learning and AI to understand and model how attackers could enter and move around the network.

blockchain links

Cybercriminals are using blockchain to improve security. Should you?

Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.

sequence 01.00 00 22 08.still001
video

CIO Leadership Live with Dick Daniels, CIO of Kaiser Permanente | Ep 14

In this episode, host Maryfran Johnson talks with Dick Daniels, CIO of Kaiser Permanente, about the forces shaping the healthcare industry, and how the healthcare consortium is taking on the tasks of improving IT productivity and...

passwords

Are long passphrases the answer to password problems?

Passphrases can be more secure than passwords, but there are limitations and hackers will eventually master cracking them.

shark risk dominate navigate lead danger

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.

Load More