Insider
Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!
17 cyber insurance application questions you'll need to answer
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.
How cybercriminals turn ‘harmless’ stolen or leaked data into dollars
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.
Defining linchpins: An industry perspective on remediating Sunburst
The concept of linchpin software can be useful in assessing risk and focusing security efforts, but it comes with challenges.
6 most common types of software supply chain attacks explained
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
How to prepare for the demise of Windows NT LAN Manager
NTLM is a less secure protocol for authenticating Windows network access. Follow these steps to begin migration off it or to limit its use.
5 best practices for conducting ethical and effective phishing tests
Phishing tests have become a popular feature of cybersecurity training programs, but they should follow ethical frameworks to ensure they don’t do more harm than good.
Tailor security training to developers to tackle software supply chain risks
Software developers need specialized security awareness training to help them spot supply chain risk and avoid being victimized by attackers.
The 10 most dangerous cyber threat actors
These are the most notorious global cybercriminal and state-sponsored groups according to security researchers.
How API attacks work, and how to identify and prevent them
Attackers know how to get around WAFs and API gateways when targeting APIs. Here's how some companies are coping with the rapid increase in API attacks.
8 things CISOs should be thinking about, but probably aren't
CISOs need to cover all the security bases. The problem is, some of the bases are easy to overlook.
What cloud providers can and can't do to protect your data
Moving data to the cloud requires a sense of shared responsibility for security. Here's how cloud providers protect your data and what you still must do yourself.
DDoS attacks: Stronger than ever and increasingly used for extortion
Low cost and ease of execution drive a resurgence in distributed denial of service attacks as criminals profit from extorting victims.
5 things CISOs want to hear about SASE at the RSA Conference
Organizations are planning for secure access service edge (SASE) but have questions on how to get from their current state to converged, cloud-delivered networking and security. They’ll be looking for answers at RSA.
Minimizing damage from a data breach: A checklist
How you respond to a data breach and the amount of damage it causes depends on how well prepared you are. Have you done everything on this list?
What CISOs really want from security vendors
Less risk? Better security? Value for dollars spent? Check, check, and check. But of all the things CISOs want from security vendors, trusted partnership tops the list. Here's how leading CISOs find and foster those relationships.
3 steps to smarter cybersecurity hiring and team building
Amid the global cybersecurity skills shortage, organizations and security leaders must shift their hiring and team development approach to have fewer barriers, be more diverse, and take the long view.
How malicious Office files and abused Windows privileges enable ransomware
Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.
5 key qualities of successful CISOs, and how to develop them
CISOs today need significantly different skillsets to cybersecurity leaders of the past as they become more critical to business success.
-
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
eBook
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet
-
Sponsored by Sophos
-
Sponsored by ExtraHop






![Digital Transformation [DX] > dandelion seeds blown by a virtual wind of change](https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-medium.3x2.jpg)