Opinions

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.

A business man touches a futuristic lock + circuit board security interface.

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security.

A circuit-board house.

The CCPA is an opportunity to get your data security house in order

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue.

budget piggy bank spending savings security spending

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.

Distorted and glitched binary flag of the United States of America

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking.

A row of business people / employees / professionals / team

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive.

Chris Christiansen

Remembering Chris Christensen

The long-time cybersecurity analyst is gone but not forgotten.

'I Voted' sticker / abstract data encryption / secure voting in elections

Why manipulation campaigns are the biggest threat facing the 2020 election

This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content. It's one of the nation’s greatest threats, especially as we approach the 2020 presidential election.

data architecture

Data on the rise: 4 new challenges security must master

Data is information security's bread and butter, but the rise of data brings both new challenges and new opportunities. To meet them, security needs to change its relationship with data.

digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.

CSO Executive Sessions [podcast logo]

Introducing ‘CSO Executive Sessions’

Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions, which will feature conversations with leading security and risk executives from around the country about the challenges faced by their...

cloud security / data protection / encryption / security transition

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.

security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

data / analytics / trends

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud.

Digitizing stylus input via tablet  >  writing / drawing / signatures

NHTSA odometer disclosure rule might pave way for e-signature authentication

The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics.

artificial intelligence / machine learning / binary code / virtual brain

Who will harness AI more effectively in the new decade: cybercriminals or cybersecurity professionals?

The intersection of AI and cybersecurity will loom large not only for security practitioners but for the well-being of society.

rear view mirror with desert scene in the distance

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them.

Load More