Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

A circuit-board house.
CSO > global security

CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

Windows security and protection [Windows logo/locks]

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.

man typing on laptop search internet web browswer

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed.

Distorted and glitched binary flag of the United States of America

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking.

data analytics / risk assessment / tracking data or trends

Risk profiling gives PPD real-time view of vulnerabilities

How drug development company PPD built its own risk profiling tool to give all stakeholders a simpler, clear view of risk associated with every IT asset.

A row of business people / employees / professionals / team

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive.

User ID + password / credentials / authentication

5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks.

Tiny figures are drawn toward a big, glowing lightbulb with a security shield. [idea/opportunity]

How one law firm made security a business development opportunity

Mark Walmsley, CISO at international law firm Freshfields, says a proactive approach to security helps the business win clients and gets its lawyers to embrace security.

A businessman walks through a keyhole-shaped doorway into field of question marks.

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?

CSO > Security mechanisms vs. fiery threats

How to set up Windows Firewall to limit network access

By enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs.

mobile phone messaging email network collaboration tools

With email security, some things can't be outsourced

You can outsource your email, but a good chunk of securing that email remains in-house. Here's what you need to know.

IT staff setting server hardware in a data center.

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be.

Job vacancy / staffing staffing problem  >  empty chair / binary code / lock + shield

5 ways to cope with the cybersecurity skills shortage (that don't involve hiring)

Unable to hire their way out of cybersecurity staffing problems, CISOs are turning to process automation, advanced analytics, and third-party services, among other methods.

Conceptual illustration of the convergence of disparate technology threads in a digital environment.

Closing the security gap in OT/IT convergence

End-to-end security between converging information technology and operational technology worlds is imperative, but technical and cultural differences separate them. Here’s how to close the gap.

Tour de France cyclists racing / global digital broadcast connections

How the Tour de France secures its broadcast from disruption

Few sporting events have the scale and logistics challenges that the Tour de France presents. Event organizer ASO uses the cloud and tight physical security to avoid cyberattacks and broadcast integrity.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.