Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

A group of business leaders / board members with questions.

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone.

microsoft windows bitlocker encryption desktop pc monitors

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help.

CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.

cso siem visibility gap in security apps legacy eyes crack breach privacy

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.

distributed / decentralized network connections across the globe

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.

Conceptual blockchain imagery.

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead.

Multiple-exposure image of a businessman ascending a staircase within the profile of man in thought.

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO.

succession brain sharing intellectual knowledge sharing

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

internet web browser

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you.

CSO  >  Searching for vulnerabilities  >  Magnifying lens in a virtual interface idnetifies weakness

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also provides advice to help fix problems.

Closed markets in a dangerous neighborhood behind a police line caution tape barrier.

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels.

Network encryption / encrypted data transfers

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.

secure government messaging

What is the CISA? How the new federal agency protects critical infrastructure from cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) is a new federal agency, created to protect the nation's critical infrastructure.

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Is the digital identity layer missing or just misplaced?

The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers.

CSO / NW  >  Engineer checking/testing servers

Your backup and restore process is broken--here's how to fix it

Don't wait for a ransomware attack to expose backup flaws. These eight steps will put you on the path for reliable data restores.

CSO  >  Access protocols  >  Pixelated digital check mark and process arrows.

How to use the new Microsoft 365 Business Conditional Access feature

Microsoft 365 Conditional Access lets you automate conditional access controls for cloud applications. If you haven't enabled it yet, you should.

CSO  >  Arrows that have missed their target.

Top 8 security mistakes in SAP environments

The complexity of modern SAP footprints and common security failures have left many organizations exposed to avoidable risks.

network endpoint connections / synapses

Review: CrowdStrike Falcon breaks the EDR mold

The biggest differentiator with Falcon is that the brains of the platform exist completely in the cloud, which gives it unlimited scalability as well as a massive footprint of users and enterprises.

Define your organization's culture

4 tips for building a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it.

legos building blocks easy simple low code no code apps by iker urteaga unsplash

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.

Load More