Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner.

successful team collaboration shows happy employees celebrating and giving each other high fives

How Prudential measures its security culture to identify risk

The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / razor wire

How to lock down Remote Desktop Protocol servers

Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers.

Global geopolitical vectors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors.

disaster preparedness  >  checklist / batteries / tools / first aid kit / matches / water / radio

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis.

mobile connection endpoint protection laptop shield

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out.

Security administration  >  A shield protects a network of users and systems.

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing.

FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.

security risk - phishing / malware / social engineering

How to prepare Microsoft Office and Windows for ransomware and email attacks

You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?

Exiting the computing business

5 reasons security staff leave (and what to do about it)

Retaining skilled security staff is difficult in the best of times, but there are steps you can take that will make a difference.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.

Slack logo / security / network

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

5G light trails

5G without governance is risky business

5G implementations that fail to include baking in the needed governance safeguards will be subject to cost overages, inefficiencies and erosion of customer trust. Can your business afford that risk?

A woman and a man have a conversation while holding a notebook and pen, coffee and a mobile tablet.

How CISOs and data privacy officers should work together

Close collaboration between CISOs and DPOs can benefit both roles in their efforts to better understand, align with and protect the business.

abstract face / digital identity

4 key problems with digital identity and why we need a new approach

To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.

Social engineering / social media security / privacy breach / fraud

Toward a common UI for security operations

New dashboards and visualization tools could improve personnel training, and SOC productivity while streamlining security operations.

binary code flows around a corporate structure / cybersecurity / technology companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down.

coding / programming / development / binary code

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process.

Gauges + performance indicators / binary code

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others.

Load More