Research

cloud documents

Do you know where your sensitive documents are?

If your employees aren't even aware of what document management tools your organization uses — and that's true for 20% of them, according to a recent survey — you've got some serious policy enforcement issues.

quantum computing KryptAll

Why cybersecurity spending will drive business digitization

As companies shift to digital technologies, they are investing more money in tools to protect their corporate networks and inviting CISOs to help plan and implement enterprise architecture.

museum showcase

How to protect your mission-critical information

A new report by the Information Security Forum (ISF) outlines the steps you can take to determine your mission-critical information assets &and create customized plans for protecting them.

grade blackboard cminus

Is security making the grade? What IT and business pros really think

When it comes to security, who’s in charge, where do roles and responsibilities overlap, and what are the biggest challenges to aligning infosec and business goals? A joint CSO, CIO, Computerworld survey sheds some light.

stopwatch zero

The speed of ransomware: 3 seconds to encryption [Infographic]

Once you've clicked the phishing email, it's too late.

third party threats

5 security practices hackers say make their lives harder

Hackers believe no password is safe from a determined attacker, but they agree that five key security measures can make it a lot harder to penetrate enterprise networks.

hacking critical infrastructure security

How cyber attacks work [Infographic]

How attackers get in, the tools they use, and how data is stolen.

privileged accounts

Businesses failing to secure privileged accounts

A new benchmark survey finds that more than half of organizations have a failing grade when it comes to securing privileged accounts that can give attackers access to their entire networks.

money ransom

What your users need to know about ransomware [Infographic]

Who's a target, how it gets in, and what to do if you're infected.

digital transformation security

Security teams consulted too late on digital transformation

A new survey finds 76 percent of IT professionals with responsibility for security feel their security teams are brought in too late to have a meaningful impact on digital transformation projects.

security hole in fence clouds gap opening

Study: More than 50% of SMBs were breached in the past year

"Negligent employees or contractors and third parties caused most data breaches," according to the report. "However, almost one-third of companies in this research could not determine the root cause."

mind the gap 620x465

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report.

app security

Your open source security problem is worse than you think

Sixty-seven percent of applications reviewed by Black Duck Software contained known open source security vulnerabilities.

shadow it

Shadow IT 101: Beyond convenience vs. security

Shadow IT may be IT's fault, but it's security's problem. Here's what you need to know.

insider threats

By the numbers: Cyber attack costs compared

Not all cyber attacks are created equal. Here's an at-a-glance look at what are the most expensive cyber attacks, how costs are distributed, and where organizations are putting their money.

emv chip and pin

State of EMV report: Fraud rises before a fall

Counterfeit fraud losses for retailers will hit $4.5 billion in 2016; fall to $1 billion by 2020.

balance comparison

Security vs. IT: Your 2016 career outlook compared

Annual IT Salary Survey shines a light on hiring and compensation trends.

Salary survey 1

Salary Survey 2016: How does your compensation stack up?

Computerworld’s annual IT Salary Survey results are in. Find out what your peers said about their career outlook and how your salary compares.

heart mousetrap

Risky business? Online dating fraud dips during Valentine's Day

Good news, online daters, according to research conducted by device intelligence and fraud prevention company iovation, fraud on online dating sites is lower leading up to Valentine's Day.

ecryption opener

Survey: The state of encryption is strong, but mind the gaps

Companies lag in protecting employee information, mobile devices.

Load More