Opinions

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall
staring at the boss

mcdonalds restaurant

Insider threats: From McDonald’s Monopoly to today, how to address how little has changed

What have we learned this year? Insider threats haven’t changed much. Companies and people still focus on the bright, shiny new technologies or expected windfalls from major projects. Many ignore the governance, controls and processes...

honey jar dripper

Avoiding the pitfalls of operating a honeypot

Businesses should think very carefully before moving forward with any honeypot project.

data scientist woman at virtual monitor user interface tools for data science by metamorworks getty

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.

cso siem visibility gap in security apps legacy eyes crack breach privacy

3 keys to preserving customer relationships in the wake of a data breach

To thrive after a data breach, try talking to your customers during one.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

Three businessmen - see no evil, hear no evil, speak no evil. [Thinkstock]

Ignorance is not bliss when it comes to defending against the dark web

There is an unhelpful taboo around the dark web, but security professionals owe it to their organizations to take on the challenge of understanding its threats and attack types.

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

Blackout, New York City skyline

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...

dumpster fire

What security companies – and all of us – can learn from the Deadspin debacle

The recent news of the exodus of the entire editorial staff of the popular sports and culture website Deadspin sent reverberations throughout the media. But two of the biggest lessons to be learned from Deadspin’s downfall should...

neon skull sign / danger / caution / threat

The 24/7 insider threat – Managing risk in a changing environment

A new model for managing insider risk in the "always-on” and “on-demand” workplace.

Job vacancy / security staffing problem  >  empty chair / abstract lock + circuit mechanisms

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover.

protected key within a secured network

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large.

CSO > cloud computing / backups / data center / server racks / data transfer

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Rising complexity, higher stakes for enterprise risk management

As the pace of business and a shifting threat landscape challenge enterprises, optimizing risk has become a moving target.

rfp write a proposal document contract signature deal agreement paper by extreme media getty

4 key vendor contracting pitfalls

Unless these 4 pitfalls are avoided, a vendor can have the absolute best security documents in the industry and still present material risk to its customers.

EU / European Union / GDPR data privacy, regulation, compliance

Global Data Protection and the right to be forgotten

Will the United States ever get its own privacy law?

aerial view of a network of roads

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...

Load More