Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

8 getting breached is bad for business
questions to ask a vendor curious hand with question mark tablet ipad by stevanovicigor getty

A virtual sphere of photos of individuals appears against a cityscape.

3 steps to smarter cybersecurity hiring and team building

Amid the global cybersecurity skills shortage, organizations and security leaders must shift their hiring and team development approach to have fewer barriers, be more diverse, and take the long view.

Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.

Conceptual image of three figures running toward a goal, along trend lines drawn by a large hand.

5 key qualities of successful CISOs, and how to develop them

CISOs today need significantly different skillsets to cybersecurity leaders of the past as they become more critical to business success.

target threat hunting program sitting duck duck shooting gallery by roz woodward getty 2400x1600

Tips and tactics of today's cybersecurity threat hunters

Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.

network security / secure connections / integrated system of locks

5 things CISOs want to hear about zero trust at the RSA Conference

Security executives are interested in how ZT vendors will integrate with existing technologies, supplement ongoing projects, and support business processes.

Joanna Burkey, CISO, HP

HP CISO seeks to transform cybersecurity

HP CISO Joanna Burkey sees a pivot to business partnership as vital for cybersecurity’s success. Inspiring women to join the sector is essential to this shift.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.

New York City / digital technology framework / binary code

To better defend digital assets, follow physical security's playbook

It’s high time that the owners and managers of corporate networks take the same approach and sense of urgency to protecting corporate digital assets that their physical security counterparts have taken with building security.

A firmware message appears on a circuit board.

3 ways to prevent firmware attacks without replacing systems

Use these Microsoft Windows and Office features to mitigate the risk from firmware attacks. They are faster and cheaper than replacing computers.

cloud security / data protection / encryption / security transition

6 tips for better collaboration between security and cloud teams

Good communication, mutual understanding of each team's goals, and proper processes and infrastructure will ensure an effective working relationship between cloud and security teams.

CSO > Invalidated cyber insurance

Buying cyber insurance in 2021? Expect greater scrutiny, higher premiums

Increased frequency of cyberattacks and growing associated costs could mean higher premiums, tighter risk assessments, and changes in coverage this year.

CSO: Have you met these hackers? [slide 07]

Hacktivism’s reemergence explained: Data drops and defacements for social justice

A record amount of leaked data to expose far-right groups signals a more focused and serious approach to hacking for a cause. To understand the risk, CISOs should pay attention to the news.

Conceptual images of a woman listening to a stream of abstract letters.

8 things CISOs want to hear from XDR vendors

Beyond industry rhetoric, vendors must use their time at the RSA Conference to provide clarity around what XDR is, where it fits, and how it complements existing security technologies.

cyberinsurance

Four years after NotPetya, cyber insurance is still catching up

Experts advise “terrified” insurers to better engage businesses to ensure long-term viability, and they advise businesses to track their policies closely.

vulnerable breach cyberattack hacker

Most common cyberattack techniques on Windows networks for 2020

Recent research breaks down the preferred techniques attackers use to gain access to Windows networks. Use this information to monitor your logs for these methods.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier, whether it's pen-testing, OSINT, vulnerability assessment, and more.

dashboard / report / metrics / results / analysis / management

How to write a cyberthreat report executives can really use

As savvy CISOs know, a well-crafted and well-timed cyberthreat report can help executives grasp what’s happening in the world of cybersecurity—and it just might replace those late-night phonecalls.

Missed target arrows bullseye

7 most common ways to fail at DevSecOps

DevSecOps initiatives are fraught with peril and require careful consideration of culture, learning, process and business needs. Here's how companies tend to fail in those areas.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.