Advertisement

article image 1200 x 800 cw 128technology

Virtual Event

Join Computerworld and 128 Technology for a virtual roundtable to discuss the challenges faced by IT organisations on the basis of the lockdown response, and how this is set to mould the future of networks. There will be an opportunity to discuss best practice, avoiding common pitfalls and reflect on the lessons learned from 2020.

cso security forum article

Virtual Event

The CSO Security Forum explores everchanging role of the CISO, key learnings from the pandemic, and explores keys trends going forward.

Advertisement

cio 100 the conference article v2

Virtual Event

The CIO 100 recognises the most transformational and disruptive CIOs and technology leaders in the UK. Hear from esteemed technology leaders and peers through a variety of panels and keynote presentations as they discuss leading transformation across a diverse range of markets and the initiatives to be implementing for 2021.

ransomware attack

New Intel CPU-level threat detection capabilities target ransomware

The new capabilities in the Intel mobile processors will make it harder for ransomware to avoid detection.


virtual puzzle cube / problem-solving / solution / strategy

How to reboot a broken or outdated security strategy

CISOs talk about how they identify when they need a new security strategy and the process of developing it and selling the reboot to stakeholders.


gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.


handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


Advertisement

trojan horse malware virus binary by v graphix getty

17 types of Trojans and how to defend against them

Trojan malware comes in many different types, but all require a user action to initiate.


A large 'X' marks a conceptual image of a password amid encrypted data.

Hashing explained: Why it's your best bet to protect stored passwords

Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.


A hacker attacks from within a Windows system.

Top SolarWinds risk assessment resources for Microsoft 365 and Azure

Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.


Australia  >  Sydney  >  Streetscape / vanishing-point perspective / path / future / progress
Lohrmann on GovSpace

3 security career lessons from 'Back to the Future'

You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.


Tech Spotlight   >   IT Leadership [intro]   >   One glowing arrow leads a pack of other arrows.

What IT leadership looks like in 2021

As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.