Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Multiple individual cloud instances / cloud deployments
data architecture

teamwork / collaboration / developers / development / engineers / binary code / virtual interface

Vulnerability management requires good people and patching skills

Multinational construction materials maker LafargeHolcim focuses hard on patching to prevent potential exploits further down the line.

digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

Microsoft Windows  >  Defending against attacks

3 ways to make your Windows network harder to attack

Start the new year right by checking these three areas for potential vulnerabilities in your Windows network. Don't make it easy for attackers.

mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.

A man looks through a magnifying lens at a group of figurines.

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship.

cloud security / data protection / encryption / security transition

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

Demand for talent  >  Two business people compete for a third in a tug of war

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality.

Windows logo / life preserver / rescue / recovery / fix / resolve / solution

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem.

cloud network assets / cryptocurrency / IoT / disruptive technologies / digital transformation

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud.

incoming emails / DNS security / locked server / parked domain

How to stop email spoofing of parked domains

Publishing a DMARC record for unused domains is a good idea. Here's how.

analyzing performance of wireless mobile connectivity data statistics

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro.

access control / authentication / privileges / security

Two tips to make multifactor authentication for Office 365 more effective

Here's how to set up "break glass" accounts for emergency admin access to Microsoft Office 365 and brand your Office 365 log-in page to foil fake pages.

keeping the cloud secure cloud security lock padlock private cloud

Review: How DivvyCloud protects cloud deployments

Keep your cloud instances in compliance throughout their lifecycle — regardless of the type of cloud, the technology or the vendor.

A businessman figurine carrying a suitcase stands on a map / travel / traveller / journey

Top 5 states for cybersecurity jobs

These states boast high average salaries and plenty of job opportunities, but that's not all that sets them apart.

An armored knight armor with halo and wings holds a shield, layered in Microsoft brand colors.

How to use Microsoft Compliance Score to improve data protection

The new Compliance Score console in Microsoft 365 offers templates and advice to help meet the ever-growing list of regulatory data protection and privacy rules.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?

targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

How to protect your business from holiday attacks

Attackers see opportunity in the holidays, but these simple steps and considerations can help block their efforts.

Load More