Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Remote worker  >  A man works from home with his dog

CIOs say security must adapt to permanent work-from-home

Both private- and public-sector CIOs see many more employees permanently working remotely, and say security needs to adapt to new threats and how they communicate.

Encryption  >  Encrypted data / hexadecimal code

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

A man with his head in his hands amid abstract security contruct.

Stretched and stressed: Best practices for protecting security workers' mental health

Security work is stressful under the best of circumstances, but remote work presents its own challenges. Here's how savvy security leaders can best support their teams today — wherever they're working.

Double-exposure shot of a businesswoman using a mobile phone, binary code and statistical graphs..

Skills and traits of a business-savvy CISO

CISOs looking to advance their careers or land a plum job must prove they are really on top of their game. Here's what recruiters say sets business-savvy CISOs apart.

A hacker attacks from within a Windows system.

Windows code-signing attacks explained (and how to defend against them)

Learn how code-signing attacks work and how to defend against them. It starts with patching.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Content fraud takes a bite out of brand reputation

Scammers leverage user-generated content on trusted sites to trick consumers into sharing sensitive data, causing financial and reputational harm to those businesses.

business leadership / double-exposure of a woman with laptop and phone, city skyline + abstract data

10 value-adds that CISOs can deliver

Savvy security chiefs are generating returns for their organizations beyond enabling secure business operations. Here's how they do it.

A woman speaks to a team at workstations. [presentation / briefing / training / instruction]

How to choose the right security training provider for your team

When it comes to keeping your security team's skills sharp, there is no one-size-fits-all approach. Here's how to assess your needs and the ability of training services providers to meet them.

woman leader strong collaboration multi cultural diversity

Addressing diversity in security

Turning good intentions into action requires a collaborative approach across the public sector, private sector, and non-profit industry associations.

A virtual checkmark in digital system / standards / quality control / certification / certificates

Why it's time to shift to extended validation certificates

More than ever, a strong organizational identity is essential for building trust with users.

radar grid / computer circuits / intrusion detection / scanning

7 things to consider when choosing managed detection and response

Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.

coronavirus remote worker work from home romolotavani getty

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for...

A censorship label is splashed across an image of a man hiding behind his laptop.

TLS attacks and anti-censorship hacks

Despite safeguards in TLS 1.3, China is still censoring HTTPS communications, according to a new report. There are workarounds to this. Plus, how TLS can be used as an attack vector.

Digitization of United States currency  >   Digital transactions

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

open box / abstract code / open-source code

4 best practices to avoid vulnerabilities in open-source code

Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems.

team management / teamwork strategy

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better...

incoming emails / DNS security / locked server / parked domain

18 (new) ways attackers can compromise email

Researchers have discovered eighteen new vulnerabilities in how email systems authenticate senders, making it even easier for criminals to fool users.

A mobile phone with virtual security framework overlay.

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.

security access / authorization / login credentials / username / password / mobile phone

8 steps to protecting login credentials

Follow this advice to help users and network admins to better protect login credentials to corporate systems.

data explosion / data streams / volume / velocity

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

Load More

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.