Features

continuous authentication

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

blockchain cryptocurrency digital security

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

endpoint security hacker vulnerablility secure mobile security app

4 must-know facts about secure mobile printing

Mobile printing is making major strides right now. Is your company's mobile print security up to speed?

rules procedures manuals

10 old-school security principles that (still) rule

Oldies but goodies, these security tips have stood the test of time.

cloud security data breach crime accessible

Cloud security configuration errors put data at risk; new tools can help

As more and more companies move to the cloud, misconfigured services are putting data and systems at risk. New management tools can help.

net neutrality

Will the end of net neutrality be a security nightmare?

Effects of the net neutrality repeal are hard to predict, but there could be additional costs for using endpoint security tools if data rates rise. Best advice: Stay the course on security for now.

learn basics of ethical hacking

What is penetration testing? Ethical hacking basics and requirements

Penetration testing, or ethical hacking, is an in-demand skill for evaluating an organization’s defenses. Here’s what it entails and tips for breaking into the role.

job search machine learning ai artifical intelligence robotics automation

6 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

cloud security ts

How do you secure the cloud? New data points a way

Two new reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

Artificial intelligence and digital identity

What is identity management? IAM definition, uses, and solutions

Identity and access management products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

CISOs

How to write a CISO job description

The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role.

plastic soldiers

Open source software security challenges persist, but the risk can be managed

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security.

raining data on keyboard programming developer code

What is DevSecOps? Developing more secure applications

DevSecOps is about introducing security earlier in the life cycle of application development, thus minimizing vulnerabilities and bringing security closer to IT and business objectives.

futuristic user interface - smart city - digital transformation

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

supercell cloud

The dirty dozen: 12 top cloud security threats for 2018

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

robot gear automation

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief.

4 change password

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

cyber security

What is cyber security? How to build a cyber security strategy

Organizations face many threats to their information systems and data. Understanding all the basic elements to cyber security is the first step to meeting those threats.

saas

Security platform or best of breed? There’s only one answer

How limited resources and the software as a service (SaaS) sales culture force security professionals into a best of breed strategy for infrastructure.

human weak link cybersecurity primary

Why incident response is the best cybersecurity ROI

Former White House CIO says unexpected breaches can wreak havoc on a company's bottom line. Proper incident response planning can mitigate damage costs.

Load More