Security

Security | News, how-tos, features, reviews, and videos

Co-workers maintain social distancing as signs mark chairs to remain vacant in a post-COVID office.
artificial intelligence / machine learning / binary code / neural network

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Inside Adobe's employee-focused COVID-19 response roadmap

A comprehensive business continuity blueprint and advance planning paved the way for Adobe's rapid work-from-home transition, but the focus on employee experience was the key to success.

coronavirus remote worker work from home romolotavani getty

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for...

cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

data explosion / data streams / volume / velocity

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

broken lock amid binary code and circuits

Critical flaw allows hackers to breach SAP systems with ease

SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.

cyber resilience shock absorber

Lessons in IT resiliency for the COVID-19 era

Rapid response to disruptions caused by the pandemic will lead to better continuity plans going forward, participants in an #IDGTECHtalk Twitter chat said.

Cybersecurity lock with the abstract circuitry of a security fabric.

What is the Risk Management Framework (RMF)? A standardized security framework

Risk management and security are top concerns for most organizations, especially in government industries. The Risk Management Framework (RMF) integrates security into the early development stages to help speed up time to delivery...

security integration / network of integrated security technologies

Ellie Mae turns to AI for autonomous threat hunting

The mortgage processor is using threat intelligence, predictive analytics, and AI to proactively hunt advanced persistent threats like ransomware.

cios get strategic abcs basics steps foundation

3 steps to developing a risk response advisory system

Much like DEFCON is used in the U.S. Armed Forces to react to changing threat levels, your enterprise needs its own PANDCON to deal with changing pandemic conditions. Here's how to get started.

Scattered business people in personal wireframe spaces within a massive data repository.

Defining a data privacy strategy in the digital era

Personalized customer experiences, automated business operations, and data science-driven insights all depend on the quality and volume of your data. However, while the last decade has been a rush to drill for data, it is becoming...

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

Virtual connections between a distributed network of teams.

CIOs offer strategies for engaging an entirely mobile workforce

Working from home has been a success operationally, but it has strained people, processes and technology. CIOs discuss the opportunity to make each better in the days to come.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

video conferencing / remote work / online meeting

5 lessons companies should learn about working at home

Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.

floating umbrellas against a blue cloudy sky

Silver linings: Why COVID-19 will encourage a national privacy law

Consensus has formed around the need for a national privacy law; Congress should seize this opportunity.

Load More