Security

Security | News, how-tos, features, reviews, and videos

10 untruthful lies liar untrustworthy
facial recognition - biometric security identification

multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

cybersecurity skills and talent shortage

7 ways to narrow the cybersecurity skills gap in 2020

Over the long haul, government intervention, public-private partnerships and an integrated industry effort may be needed to address challenges in filling cybersecurity positions.

CSO slideshow - Insider Security Breaches - Spam email identified

Will spam die in 2020?

The problem with spam isn't that it's a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.

cyber threat security compromised vulnerable men on the street

Cybersecurity in 2020: Vigilance and the human element

Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in...

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

iot security tablet horizontal primary insider pro IDG

IoT security: Why it’s your biggest nightmare

The internet of things encompasses connected devices on a massive scale, actionable data and innovative business models – and it also brings unprecedented security headaches.

career roadmap primary

What it takes to become a CISO

The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.

IT certifications and training center

Certifications show that you’re committed to your job, have specific skills and are willing to up your game. Check out our online training courses and guides to top certifications -- all part of your Insider Pro subscription.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

A business man touches a futuristic lock + circuit board security interface.

Review: How CybeReady delivers targeted, timely security awareness training

Users will always be the last line of defense for email-based attacks. The CybeReady platform effectively trains them to spot phishing and other dangers, unobtrusively and as-needed.

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.

business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

online certification mortar board graduate student study certificate  by pettycon pixabay and janjf

Earn your IoT security certification

Insider Pro subscribers have free access to an online course that leads to a Certified IoT Security Practitioner (CIoTSP) certification.

nw iot news internet of things smart city smart home7

IoT roundup: Carriers expand NB-IoT, Congress eyes IoT security …

A powerful IoT networking technology used by the major carriers continues to gain ground, Congress makes noise about training and a prominent researcher warns of security trouble ahead.

Cybersecurity  >  Email security threats, such as phishing

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers.

CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.

Load More