Opinions

A rubber duck sits on a target's bullseye  >  sitting duck / easy target / victim targeting

Dear future victim, please panic

I am the opportunistic infection, THE DORMANT CYBER PATHOGEN now awakes! While you're worried about COVID-19 infection, I'm already inside your networks!

CSO Executive Sessions [podcast logo]

Episode 6: Building security in

Podcast Episode 6: Listen now as Mike Towers, CSO at Takeda Pharmaceuticals International, discusses getting to a place where it is easy for the business to do the secure thing.

abstract face / digital identity

4 key problems with digital identity and why we need a new approach

To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life.

Social engineering / social media security / privacy breach / fraud

Toward a common UI for security operations

New dashboards and visualization tools could improve personnel training, and SOC productivity while streamlining security operations.

CSO Executive Sessions [podcast logo]

Episode 5: In security, soft skills are king

Podcast Episode 5: Listen now as Chad Teat, Chief Information Security Officer at Floor & Decor, discusses the secret to balancing risk and business opportunity.

A glowing lightbulb stands out from the crowd of unlit lightbulbs.

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

telecommuting corona virus surgical mask remote worker 5g wi fi by mediaphotos getty images and wyn

How the coronavirus is changing tech and 5 things to do about it

Due to the Covid-19 virus, some tech-culture trends are radically accelerating. Others are being reversed. And it's happening all at once. Here's what you need to know.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

A circuit-board house.

The CCPA is an opportunity to get your data security house in order

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

Distorted and glitched binary flag of the United States of America

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking.

A row of business people / employees / professionals / team

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive.

Chris Christiansen

Remembering Chris Christensen

The long-time cybersecurity analyst is gone but not forgotten.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.

digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

CSO Executive Sessions [podcast logo]

Introducing ‘CSO Executive Sessions’

Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions, which will feature conversations with leading security and risk executives from around the country about the challenges faced by their...

Load More