Security

Security | News, how-tos, features, reviews, and videos

access management / access control / user connections / identities
Encryption  >  A conceptual technological lock and encrypted code.

security key to digital transformation

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

containers

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

iot internet of things chains security by mf3d getty

IoT roundup: A wide-scale security flaw and energy-sector botnets

Monitoring water treatment using IoT will become $3.5 billion business.

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

montage of cityscape and man holding tablet

Did Microsoft just solve a big business iPad problem

One of the most disappointing things about iOS devices as business devices, and one of the things that keeps the iPad from being a true computing solution, is that there is no support for multiple-user accounts. An unlikely ally is...

online meetings / virtual events / digital conferences / video conferencing / remote teams

The new pandemic labor landscape for cybersecurity jobs, skills and certifications

As cyberattacks increase, how can employers fight back? And what should employees do to capitalize on new job and career opportunities?

CSO  >  Arrows that have missed their target.

Why coronavirus contact tracing apps are failing

Security, yes. But the biggest problem to adoption is staring us all in the mirror. Here's what that means for you and your organization.

Network security  >  simplified / centralized / unified

Zero Trust: Protecting your company inside and out

The traditional castle-and-moat security model where users, once inside the firewall, were automatically trusted has long been outdated. What if you can't trust anyone in or outside your network?

A leader considers her strategy / lightbulb / circuits / digital transformation / success

5 areas IT leaders should be followers

Here's where board members, the c-suite, managers and team leaders need to take charge by falling in line.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

nw iot news internet of things smart city smart home5

IoT takes aim at social distancing

How IoT technology can help enforce social-distancing rules by monitoring occupancy in workspaces.

network security lock padlock breach collaboration

How NDR protects your network from cyberthreats

Three steps to finding a network detection and response product that prevents, detects, investigates, identifies, responds and mitigates cyberattacks.

Virtual connections between a distributed network of teams.

CIOs offer strategies for engaging an entirely mobile workforce

Working from home has been a success operationally, but it has strained people, processes and technology. CIOs discuss the opportunity to make each better in the days to come.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

one lit hanging bulb among many unlit ones

10 tips for a secure browsing experience

Your browser is one of the easiest ways for malware to penetrate your network. Here are 10 ways to practice safe surfing in Google Chrome, Microsoft Edge and Mozilla Firefox.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

video conferencing / remote work / online meeting

5 lessons companies should learn about working at home

Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.

Google Gmail / email / laptop / messaging / collaboration

5 keys to supporting telework effectively and securely

Suddenly countless numbers of people are working from home. This massive shift in work processes can have huge repercussions from a security, privacy, regulatory and data governance standpoint.

Load More