Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

financ credit pos
Microsoft Office logo within an environment of abstract binary code with shield and lock.

artificial intelligence / machine learning / robot reading stack of books

Navigating the AI hype in security: 3 dos and 2 don'ts

“Very few things that advertise AI have the goods under the hood. I think what people are touting as innovative AI is still very basic, and we can go a lot further.” — Rick Grinnell, founder and managing partner, Glasswing Ventures

Networking cables viewed through a magnifying lens reveal a data breach.

Assume breach is for losers: These steps will stop data breaches

Yes, you do need to be prepared should your organization be breached, but countering social engineering, patching, multi-factor authentication and a solid backup plan will keep them from happening.

new york city 2380683 1920

How New York City plans to become a cybersecurity hub

America's largest city has been hit hard by the cybersecurity skills shortage and is working to grow its cybersecurity workforce.

Windows security and protection [Windows logo/locks]

How to protect yourself from PC hardware and hardware driver vulnerabilities

Attackers have hijacked PC motherboard update software and hardware drivers to install malware. Here's how to identify vulnerable systems and prevent driver-delivered malware.

predictive analytics numbers retro man with binoculars future horizon spying looking

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street.

8 getting breached is bad for business

How OneLogin responded to its breach and regained customer trust

After its second incident in less than 12 years, incoming OneLogIn CEO Brad Brooks saw the need to instill a security-first mindset in the company and relay that message to wary customers.

white blocks stacked containers misaligned alignment fragile falling apart flickr

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles.

containers

How to improve container security

Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Here’s how to do it.

binary code, magnifying lens, skull and crossbones

Outside-the-box malware is getting more common, security researchers warn

Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry.

decayed weathered distressed texture security weakened vulnverable

6 ways to fight deploy and decay

Even your best security controls will weaken over time after deployment, much to hackers' delight. Take these steps to slow down or get ahead of that decay.

cyber crime cybersecurity

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders.

deadline clock time speed analog clock by ryan mcguire gratisography

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations.

man with smooshed face frustrated overwhelmed stressed shocked by ryan mcguire gratisography

5 ways to curb cybersecurity burnout

91% of CISOs suffer ‘moderate or high’ levels of stress. Here are some ways to help.

succession brain sharing intellectual knowledge sharing

How threat intelligence sharing can improve the security posture of whole industries

UBS and industry peers conduct joint cyber war games to improve security posture and incident response of the whole sector.

binary code matrix

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS.

broken lock amid binary code and circuits

These two books explain how to fix our broken security industry

Organizations spend billions each year on security, but much of that spend is on the wrong things. These books will point you in the right direction.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets.

Microsoft Windows update arrows / progress bars

How to prepare for the Microsoft Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know.

Load More