Conceptual image of a team reviewing data/alerts/solutions via a futuristic interface.

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

distributed / decentralized network connections across the globe

Volterra provides protected, distributed clouds for almost any application or network

The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.

cso exectutive sessions 3000px x 3000px

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

Abstract trend lines graphing change and transformation.

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

ransomware attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

tech spotlight iot cso thinkstock 510859324 2400x1600

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

8 getting breached is bad for business

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

orange monitors with lock icon network security cyber threat

32 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

water infrastructure / wastewater treatment facility / sewage treatment plant

Attempted cyberattack highlights vulnerability of global water infrastructure

Water utilities often have few cybersecurity resources and are subject to few regulations. A failed Stuxnet-like attack on Israel's water supply shows how dangerous that could be.

Number six, painted on a door with a lock with abstract overlay of digital containers.

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

Activating a protective virtual shield amid COVID-19 coronavirus morphology

4 tips for protecting users from COVID-19-targeted attacks

Remote users in particular are vulnerable to coronavirus-themed phishing attempts, malicious domains, and repurposed malware. Protect them with these basic steps.

A roll of hundred dollar bills sits atop a silhouette of virus morphology.

Salesforce unveils tools for a post-pandemic return to the office

Work.com contains apps and information resources to support organizations as business looks to resume operations in many countries.

managing remote workers remotely

The keys to a successful remote work strategy

Getting remote work right is tough. But with a mission-driven approach and effective technology, a productive remote work strategy can really pay off.

Binary code / magnifying lens / inspection / analysis

Make simple software security checks part of your purchasing process

A few hours of due diligence when evaluating software for purchase is cheaper than incident response clean up.

Load More