Security

Security | News, how-tos, features, reviews, and videos

The open jaws of a spring trap lie in wait. [danger / risk]
A protective face mask site on a laptop displaying models of viral cells.

A virtual sphere of photos of individuals appears against a cityscape.

Security job candidate background checks: What you can and can't do

Enterprise cybersecurity begins with a trustworthy staff. Here's how to ensure that current and prospective team members aren't hiding any skeletons.

audit binary compliance magnifying glass investigate

5 ways to combat audit fatigue

The growing number of audits for security and privacy regulatory compliance is stressing security personnel and draining resources from security operations. Here's how to better manage them.

risk assessment gauge

The big debate: control compliance vs. risk management

Industry-standard security frameworks are important, but they also need to align with the rest of your organization's risk management practices.

Tech Spotlight   >   The Future of Work [Overview]   >   A crystal ball for peering into the future.

The future of work: Coming sooner than you think

What will your worklife be like years from now? Today's work-from-home world has given us a glimpse of the future, as these five articles from CIO, Computerworld, CSO, InfoWorld, and Network World illustrate.

Tech Spotlight   >   The Future of Work [CIO]   >  Business leaders / question mark overlay

7 key questions facing the future of work

A global pandemic raised the bar for IT’s capabilities. IT leaders say 2021 will be even more challenging.

team trust risk gap help assistance challenge

Risk, the misunderstood discipline

Knowing the difference between risk appetite, tolerance, and threshold enables better decision making about technology investments to drive the business forward.

cio multicloud security panel ttthumb
video

The evolution of cloud security: Where it's headed and tips to plan

Liberty Mutual’s Cybersecurity and Cloud Specialist Don Richard, IDC’s Program VP for Cybersecurity Products Frank Dickson, and IDG’s Editor-in-Chief of Enterprise Eric Knorr are all experts on cloud security. They discuss the nexus...

abstract data analytics

How DMaaS eliminates data silos and 4 tips for choosing a provider

For CIOs caught in an ever-growing web of complicated data silos, data management as a service can help drive a competitive business advantage.

Cybersecurity  >  Email security threats, such as phishing

At CES, a new era of hardware addresses the work-from-home shift

At CES 2021, Dell, HP, and Lenovo, the three largest PC vendors, all unveiled a spate of new business laptops with security enhancements like hardened protection and built-in smarts to guard against ransomware, crypto-mining, and...

Multiple-exposure image of a businessman's silhouette against an image of him climbing a mountain.

Top 8 challenges IT leaders will face in 2021

Facilitating the future of work and securing a hybrid working environment top the list of tough, pandemic-inflected issues IT leaders must navigate this year.

Cybersecurity  >  Skull + crossbones / abstract code / criminal hacker / attack / security threat

From risk mitigation to business enabler: The role of CISOs in 2021

CISOs faced a number of challenges in 2020, not the least of which was COVID-19 and the mass migration from onsite to remote work. Corporate leadership saw just how vital the security team is to ensuring the company runs, and runs...

sparkler celebrate party new year

9 IT resolutions for 2021

IT leaders share their visions on how they hope to transform their teams, their organizations, and themselves in the new year.

Shaking hands

Perfect strangers: How CIOs and CISOs can get along

The rise of security as a strategic imperative has altered the relationship between IT and infosec leaders. Here’s how CIOs and CISOs can become better partners.

Hacking stealing password data

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.

Russian hammer and sickle / binary code

SolarWinds attack explained: And why it was so hard to detect

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

Remote worker  >  A man works from home with his dog

Strike a balance: Ensuring secure remote work without hindering productivity

The expanded remote workforce requires a balanced, secure approach to accessing data, apps, and systems.

hands cropping picture frame arrows trends forward thinking future trends by photo by ian noble on

10 future trends and how CIOs can keep ahead in 2021

After a year disrupted by a global pandemic, the next normal is starting to take shape. Here's a look at what's ahead for IT organizations.

chess strategy strategic data binary game by santoelia getty images

5 ways to take control of data in 2021

COVID-19 is transforming the way the economy works, guaranteeing that our data needs will also change and grow. Here's what that means for CIOs in the year ahead.

Load More