Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Patch + update options  >  Pixelized tools + refresh symbol with branching paths
COVID-19 coronavirus structures are layered amid statistical models.

CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.

risk assessment - safety analysis - security audit

EU's DORA regulation explained: New risk management requirements for financial firms

The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.

Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.

ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.

radar grid / computer circuits / intrusion detection / scanning

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

4 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

whitelisting computer security security oversight admin lockout control by metamorworks getty images

How to take better control of applications running on your network

Unneeded or forgotten software on your Windows network could be a gateway for attackers into your system. Follow this advice to identify and restrict problem programs.

adrian ludwig 1200x800px

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

cloud security ts

Developing a multicloud security strategy

Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.

open source box open box out of the box empty

Using open source for identity projects: 8 considerations

Consider these eight points to decide whether you can securely use open-source code in your identity management projects.

trojan horse malware virus binary by v graphix getty

From pranks to APTs: How remote access Trojans became a major security threat

A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victim’s computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

locked data / bitcoins

How to buy Bitcoin for ransomware payment (if you must)

Avoid paying ransom demands if at all possible. When you have no choice, follow this advice for acquiring cryptocurrencies and executing the transaction.

common negotiation errors2

5 best practices for negotiating SaaS contracts for risk and security

Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

micro segmentation security lock 2400x1600

How network segmentation mitigates unauthorized access risk

Two recent Microsoft vulnerabilities underscore the importance of segmenting your Windows network.

cybersecurity controls

14 controls for securing SAP systems in the cloud

Organizations often don't follow security best practices when deploying and managing complex SAP systems. This set of security controls from the Cloud Security Alliance aims to change that.

Microsoft Windows update cycle arrows with overlay a laptop and mobile phone.

Windows 10 security: Are you on the right version?

If you're running an older version of Windows 10, It's time to review security enhancements that later versions offer to see if you need to update.

Load More