Security

Security | News, how-tos, features, reviews, and videos

A protected padlock with checkmark amid a field of abstract data.
Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

supply chain / virtual network of connections

Forget the users, the threat starts in the software supply chain

While every corporate network large and small tries hard to implement security policies to ensure users are only able to work with legitimate applications and data services -- when the core software supply chain itself is compromised,...

cybersecurity boards

5 ways to grow the cybersecurity workforce in 2021

The cybersecurity workforce shortage and related skills gap stubbornly persists. Risks will continue to grow in 2021, so it’s vital that organization take action to grow their cybersecurity workforce. Here's five ways to attract...

hacker presence on a network

SolarWinds: "IT's Pearl Harbor."

The experts agree. SolarWinds was the worst security disaster of all time, and it's not done with us yet.

green army soldier on a laptop keyboard

Why you're probably doing endpoint security all wrong

The traditional combination of username and password to secure company devices and systems is outdated and could be putting your business at risk. Employing an AI based continuous identity management system could eliminate nearly all...

data security / padlock / binary code / digital display

Data security vs data privacy – they’re not the same thing

Data security and data privacy are both necessary to completely protect corporate data assets. But most companies spend most of their time on the former and much less on the latter.

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

Beyond the firewall: Intrusion Detection Systems

Firewalls are so 2000s. With your "office" now scattered over homes everywhere, you need a new way of protecting your office from network threats and that's IDSs.

Remote worker  >  A man works from home with his dog

Many of us will be working from home forever

The future of work is here, and for many of us it's going to be from home.

one businessman floats above a crowd of struggling/failing ballonists

How did your continuity plan stack up against Covid?

Now that things are stabilizing, it's time to evaluate how well your business continuity plans handled Covid and where you need to make changes.

itil tips for implementation lightbulb innovation process strategy iot by ipopba getty

IoT Roundup: Carriers and connectivity fueling Microsoft's IoT expansion, IoT networks getting smarter, and security corner

This month's installment covers the impetus lent to IoT deployments by the ongoing pandemic, some new wrinkles in the security picture, and the possibility of more intelligence at the network edge in the future.

A computer with an abstract security system overlay.

Five ways to keep working from home safe for your employees and your company

For many of us, we're not going back to working from the office anytime soon, so it's time to give serious thought about securing our home offices.

A magnifying lens examines top secret information amid binary code.

Confidential Computing: What is it and why do you need it?

Confidential Computing can significantly enhance enterprise security, but what is it, and what do you need to do about it?

A heavy vault-like door / security mechanism secures a laptop amid glowing blue circuits.

You're going to be using confidential computing sooner rather than later

These days it's not enough to secure your data when it's on your disk or moving across your network, you need to lock it down in memory as well.

access management / access control / user connections / identities

7 best practices when selecting a PAM solution

The right PAM solution will enable security and compliance teams to define and enforce robust privileged account policies. So how do you pick the right PAM solution?

Encryption  >  A conceptual technological lock and encrypted code.

Is everything you thought you'd done right for security about to be at risk?

It may still be early days for quantum computing, but there has been significant progress recently. But what does that mean for today’s 'unbreakable' encrypted data?

security key to digital transformation

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

containers

The five best Kubernetes security practices

Everyone is moving to containers for their programs, and to manage them, almost everyone is using Kubernetes. That leads to one big problem: How do you secure Kubernetes itself?

iot internet of things chains security by mf3d getty

IoT roundup: A wide-scale security flaw and energy-sector botnets

Monitoring water treatment using IoT will become $3.5 billion business.

mobile security

Mobile security failings putting enterprises at risk

A typical mobile security breach in a large organization can cost millions of dollars. Mobile Security can be a daunting task with many potential pitfalls to protect against. Knowing the key security exposure mechanisms can help you...

Load More
Recommended for You