Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

layered image of male executive holding thumbs up in CMYK
A virtual sphere of photos of individuals appears against a cityscape.

mobile security / threat detection / traffic analysis

XDR is coming: 5 steps CISOs should take today

Beyond threat detection and response, CISOs should think of XDR as an opportunity to modernize the SOC, automating processes, and improving staff productivity. Here's your XDR game plan for 2021.

security audit - risk assessment - network analysis

Microsoft 365 Advanced Audit: What you need to know

Microsoft's powerful new auditing options will help detect intrusions and see what was accessed...if you've paid for the right licenses.

interconnecting gears / process / automation / machinery / mechanism / efficiency

Inrupt offers a standard for controlling data and identity on the web

Founded by security and web luminaries, Inrupt has commercialized the Solid Project technology to manage sensitive data in a more secure, compliant manner...if enough people buy into its vision.

audit binary compliance magnifying glass investigate

5 ways to combat audit fatigue

The growing number of audits for security and privacy regulatory compliance is stressing security personnel and draining resources from security operations. Here's how to better manage them.

Casual man with beard seated at home office with smart phone

10 things work-from-home employees can do now to help protect the network

WFH employees are now more susceptible to attacks that steal credentials or plant malware. Have them follow this advice to better protect themselves and the business.

A target floats aimlessly in an ocean of missed darts.

Undervalued and ineffective: Why security training programs still fall short

Research reveals a glaring disconnect between the need for security training and its perceived value. But organizations that have made their awareness programs a strategic priority and adopted more modern approaches are finding...

An open padlock with green check mark allows data to flow freely [lax security/data loss prevention]

How to select a DLP solution: 9 unusual considerations

Data loss prevention systems have become more complex, and each has evolved differently. Here’s how to select a DLP system based on required functionality and its real-life ability to prevent data leaks.

Admission tickets in an digital network / access / admittance / authorization / authentication

How to defend against OAuth-enabled cloud-based attacks

Use these settings in Microsoft Azure Active Directory to take control of user-requested OAuth access permissions.

locked data / bitcoins

How ransomware negotiations work

Here's what experienced negotiators say your organization should expect if it ever needs to pay a ransomware demand.

man with feather duster makeover clean dust

Inside cybersecurity’s shelfware problem

Sometimes underutilization of security software and services is a deliberate, strategic choice; more often it's a cause for concern.

high priority gauge

The most important cybersecurity topics for business executives

Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?

keyboard laptop microsoft edge logo web browser by urupong getty images 1200x800

How to harden Microsoft Edge against cyberattacks

Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.

Strategy  >  Moving chess pieces as abstract data overlays the game

5 ways attackers counter incident response, and how to stop them

IR has become a chess match with attackers who can cleverly spoil responders' efforts and keep a foothold in systems. Here's how they do it and how to kick them out for good.

A hand reaches to activate controls marked with gear icons [ process / update / fix / automate ]

How strong, flexible data protection controls can help maintain regulatory compliance

An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

Tech Spotlight   >   The Future of Work [CSO]   >   Laptop user with virtual security overlay.

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

sing yell announce microphone boy shout communicate perform by jason rosewell unsplash

3 ways to speak the board's language around cyber risk

Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.

skull and crossbones in binary code

What you need to know about changes to Microsoft's Security Update Guide

The Security Update Guide now aligns more closely with the CVSS, but sometimes lacks information needed to properly respond to a vulnerability report.

Technology as infrastructure / IoT / Internet of Things / Smart Home / building automation

Remote work raises threats from consumer IoT devices

With the rise of working from home, companies need to protect themselves against a wide range of consumer devices, including smart light bulbs.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.