Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

man typing on laptop search internet web browswer
Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

5 reasons users hate cybersecurity awareness training, and how to make them love it

If you want your security awareness training program to be effective, address these common user complaints.

Cybersecurity awareness  >  A man with a binary blindfold finds his way through question marks.

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization.

VPN security vulnerabilities  >  VPN alert / warning / network servers

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions.

Maersk container ship / shipping containers / abstract data

Rebuilding after NotPetya: How Maersk moved forward

In the wake of NotPetya attacks, Maersk’s IT and security teams embraced transparency, greater collaboration with business, and a risk-based approach.

Industry 4.0 / Industrial IoT / Engineer reviews virtual interface for robotics.

5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology security requires a different approach than IT security. Here are key takeaways CSOs need to communicate to other executives and boards of directors.

5G mobile wireless network technology

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.

train tracks converge / rails switch / paths merge / convergence / directory traversals

Directory traversal explained: Definition, examples and prevention

In a path traversal attack, also known as directory traversal, an attacker enters information in a web form, URL address line, or another input method that gives them access to a file or directory that they shouldn't have access to....

First aid kit  >  help / fix / patch / recovery

8 ways your patch management policy is broken (and how to fix it)

These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them.

A binary mask.

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters?

Lock + key securing abstract data with a Windows logo overlay.

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives.

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Business email compromise attacks cost millions, losses doubling each year

Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams.

secure elections / electronic voting / digital election data security / secure voting machines

Voting machine security: What to look for and what to look out for

The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely.

Graduates in cap + gown / degrees / degree programs

5 top cybersecurity masters degrees: Which is right for you?

New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five.

teamwork / collaboration / developers / development / engineers / binary code / virtual interface

3 DevSecOps success stories

Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly.

Multifactor authentication  >  A mobile phone displays a digital key to a lock on a user's laptop.

5 trends shaking up multi-factor authentication

Universal adoption of multi-factor authentication (MFA) is hindered by technical limitations and user resistance, but its use is growing. Here's why.

Email migration to Microsoft Outlook app on mobile email for smartphone user.

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook.

Impersonation / disguise / fraud / false identity / identity theft

Rich PII enables sophisticated impersonation attacks

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account access or commit fraud.

Blurred silhouettes amid abstract technology.

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.