Security

Security | News, how-tos, features, reviews, and videos

green army soldier on a laptop keyboard
data security / padlock / binary code / digital display

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

Remote worker  >  A man works from home with his dog

Many of us will be working from home forever

The future of work is here, and for many of us it's going to be from home.

one businessman floats above a crowd of struggling/failing ballonists

How did your continuity plan stack up against Covid?

Now that things are stabilizing, it's time to evaluate how well your business continuity plans handled Covid and where you need to make changes.

itil tips for implementation lightbulb innovation process strategy iot by ipopba getty

IoT Roundup: Carriers and connectivity fueling Microsoft's IoT expansion, IoT networks getting smarter, and security corner

This month's installment covers the impetus lent to IoT deployments by the ongoing pandemic, some new wrinkles in the security picture, and the possibility of more intelligence at the network edge in the future.

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

A magnifying lens examines top secret information amid binary code.

Confidential Computing: What is it and why do you need it?

Confidential Computing can significantly enhance enterprise security, but what is it, and what do you need to do about it?

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

access management / access control / user connections / identities

7 best practices when selecting a PAM solution

The right PAM solution will enable security and compliance teams to define and enforce robust privileged account policies. So how do you pick the right PAM solution?

Encryption  >  A conceptual technological lock and encrypted code.

Is everything you thought you'd done right for security about to be at risk?

It may still be early days for quantum computing, but there has been significant progress recently. But what does that mean for today’s 'unbreakable' encrypted data?

security key to digital transformation

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

containers

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

iot internet of things chains security by mf3d getty

IoT roundup: A wide-scale security flaw and energy-sector botnets

Monitoring water treatment using IoT will become $3.5 billion business.

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

montage of cityscape and man holding tablet

Did Microsoft just solve a big business iPad problem

One of the most disappointing things about iOS devices as business devices, and one of the things that keeps the iPad from being a true computing solution, is that there is no support for multiple-user accounts. An unlikely ally is...

online meetings / virtual events / digital conferences / video conferencing / remote teams

The new pandemic labor landscape for cybersecurity jobs, skills and certifications

As cyberattacks increase, how can employers fight back? And what should employees do to capitalize on new job and career opportunities?

road to future

Bridging the broadband gap: Connecting the truly last internet mile

Thanks to the coronavirus, we reply on the internet more than ever. By and large, it's held up well, but some underserved areas are suffering more than ever. What is and can be done for internet access beyond the cities?

Plan A or B / choices / different paths

CIO's Guide to COVID-19

With the novel COVID-19 coronavirus refusing to abate in hotspots around the world, the editors of CIO.com compiled a collection of resources to help IT mangers navigate the pandemic now and into 2021.

CSO  >  Arrows that have missed their target.

Why coronavirus contact tracing apps are failing

Security, yes. But the biggest problem to adoption is staring us all in the mirror. Here's what that means for you and your organization.

Load More