Security

Security | News, how-tos, features, reviews, and videos

windows 7 logo in the rear view mirror
budget piggy bank spending savings security spending

endpoint security hacker vulnerablility secure mobile security app

Will 5G increase mobile security?

We love our smartphones, but there's a dark side. Their prevalence and users’ tendencies to connect over public Wi-Fi make mobile devices a common target of bad guys. Analyst Jack Gold looks at how to mitigate the risk.

blockchain crypotocurrency bitcoin by akinbostanci getty

5 industries that will be disrupted by blockchain

Here are five major industries that will benefit from blockchain technology in the near future: financial services and banking, government, healthcare, energy, and transportation and logistics.

security policy primary

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response.

iot internet of things chains security by mf3d getty

IoT roundup: Security holes abound, GE Digital makes noise and more

This week, we look at IoT security holes -- both usual and unusual -- an IIoT player makes a move, and mergers and partnerships worth noting.

1 fake profile

Deepfakes get real (and real easy)

As if deepfake technology wasn’t scary enough. Expect the panic to reach new heights now that it’s easily accessible to everyone. Prepare for deepfakes to revolutionize social engineering.

orange monitors with lock icon network security cyber threat

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own.

network security / network traffic scanning

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches.

Blue Hexagon network security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

shadow flashlight shadowy investigation

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it.

hand at keyboard with Windows logo

Windows 10 1909: What's in it for enterprises?

This fall's update for Windows 10 may not include a raft of new features, but it does offer something even more important to enterprise IT: extended support that should make future upgrades easier to manage.

Cloud Security

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem.

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

Insider Pro  >  Plug-and-play network security

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

10 most-read articles on Insider Pro this week

What are your colleagues – or your competitors – reading on Insider Pro? These are our 10 most popular articles this week.

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

CSO > Security mechanisms vs. fiery threats

The role of next-gen firewalls in an evolving security architecture

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology.

ip guide to top security certifications tablet

Guide to top security certifications

Security professionals are in demand and with the right certification, you’re in even higher demand. To help you decide which certs are for you, we’ve compiled a list of top security certifications -- broken down by category...

business decision making 166291792

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.

Load More