Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Learn more!

Virgin Hyperloop One X-1 pod

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data.

Bingo balls read 19, 20 and 21; no. 20 at the forefront.

2020 cybersecurity trends: 9 threats to watch

Here's how your biggest threats of 2019 will likely trend for 2020 and how you might change your defensive strategy for them.

browser security

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection.

tools / toolkit / binary code

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

Laptop displaying the Microsoft logo and a laptop user beneath a digital 'Security' sign.

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know.

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

A silhouette composed of a series of clocks  >  time / transition / impermanence

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards.

laptop / networked binary data flows / world map

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

data scientist woman at virtual monitor user interface tools for data science by metamorworks getty

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions.

API security alerts displayed on monitors amid binary code / application security

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.

onion layers / binary code

Can Security Onion replace your commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it.

Red team  >  Hackers coordinate an attack.

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how.

software development / application testing / tools in hand amid abstract code mapping

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

development / collaboration / teamwork

What CIOs want from CISOs: Collaboration and no finger pointing

Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not.

supply chain / virtual network of connections

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important.

U.S. + U.K. flags merged with binary code overlay  >  US CLOUD Act / UK COPOA Act

What you need to know about the US CLOUD Act and the UK COPOA Act

A new data access agreement between the UK and US streamlines law enforcement’s ability to gain access to data held on foreign soil.

female leader traits of leader driving business woman executive

What women want in the IT workplace: 6 key factors for hiring and retention

Women are exiting IT in droves, as companies struggle to hire and engage these valuable employees. The first step to change? Listening to what women want.

Load More