Features

cso exectutive sessions 3000px x 3000px

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

ransomware attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

tech spotlight iot cso thinkstock 510859324 2400x1600

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

8 getting breached is bad for business

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

orange monitors with lock icon network security cyber threat

32 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Number six, painted on a door with a lock with abstract overlay of digital containers.

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

managing remote workers remotely

The keys to a successful remote work strategy

Getting remote work right is tough. But with a mission-driven approach and effective technology, a productive remote work strategy can really pay off.

Binary code / magnifying lens / inspection / analysis

Make simple software security checks part of your purchasing process

A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.

malicious email alerts / warnings / dangers

Email spoofing explained: Who does it and how?

Forging email has been with us since the beginning of the internet, but new security kludges are making it a lot harder.

A man looks displeased/stressed/frustrated and pinches his brow while using a computer at work.

5 risk management mistakes CISOs still make

Cybersecurity is now a board-level issue, but many organizations still struggle to get security risk management right.

remote project management om webinar video conferencing collaboration tool by shironosov getty 8570

8 expert tips for remote project management

Seasoned remote project managers offer next-level tips and tricks from the virtual trenches for coordinating the output and productivity of remote teams.

Smishing  >  A woman looks at her mobile phone in horror when receiving a malicious SMS text message

What is smishing? How phishing via text message works

Don't let the cute name fool you, smishing is a cyberattack that uses misleading text messages to trick victims into sharing valuable information, installing malware, or giving away money.

United States one-cent coin / penny / binary code

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

7 ways to make your Zoom meetings safer

Learn to use the tools Zoom gives you to secure online conferences.

carry load heavy teamwork

7 ways to optimize IT team productivity during difficult times

Even in today's challenging environment, inspiring staff members to function effectively isn't as hard as many IT leaders believe. The secret lies in smart, adaptable management.

certification education knowledge learning silhouette with graduation cap with abstract technology

12 cheap or free cybersecurity training resources

Got time on your hands during the COVID-19 crisis? Here are some great free or cheap resources to add new cybersecurity skills to your resume.

Tracking trends  > data / charts / graphs / money / budgets / salaries

10 ways to get more from your security budget

In today's economic climate, CISOs have to make every penny count and maximize every dollar. Here’s how some do that.

Load More