Advertisement

ip welcome to insider pro primary by Laurence Dutton getty

Welcome to Insider Pro

For more than 50 years, IDG has earned the trust of its readers with authoritative coverage of the technology industry. Insider Pro is the natural evolution of the insightful coverage our publications have produced for decades.


Application security  >  Software code + data protected with a lock

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.


CSO > colleagues writing on a glass wall / collaboration / teamwork

Peer product reviews: IT pros evaluate 7 enterprises offerings

These downloadable reports offer objective user-contributed product evaluations to help IT decision-makers navigate the tech purchase process.


Advertisement

onion layers / binary code

What is Security Onion? And is it better than a commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it.


Three businessmen - see no evil, hear no evil, speak no evil. [Thinkstock]
IDG Contributor Network

Ignorance is not bliss when it comes to defending against the dark web

There is an unhelpful taboo around the dark web, but security professionals owe it to their organizations to take on the challenge of understanding its threats and attack types.


United States one-cent coin / penny / binary code

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low.


easy simple pixel hand computer pointer
IDG Contributor Network

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...


Insider threats  >  Employees suspiciously peering over cubicle walls

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies.


browser security

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately.


Red team  >  Hackers coordinate an attack.

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how.


Advertisement

Alan Hill, chief information and digital officer, University of Exeter; CIO UK Summit, London [2019]

Wargaming at Exeter helps keep the university battle ready

Alan Hill of the University of Exeter says more universities need to understand who is targeting them and why to improve cybersecurity defenses and improve incidence response.


Skull-and-crossbones, code and the 'stop' gesture: hand held forward, palm out, fingers pointing up

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further...


Blackout, New York City skyline
IDG Contributor Network

Combatting extreme weather and power outages, a growing need for AI

The past month saw an unprecedented leap in natural disasters across the U.S. In an effort to prevent the spread of wildfires in California, power was shut down for days as a proactive and preventative measure. With climate change,...


partnership / teamwork / handshake

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


CSO  >  Android antivirus conceptual image

Best Android antivirus? The top 9 tools

There are plenty of antivirus tools for Android. Here's how the top nine measure up in protection, usability and features.