Security

Security | News, how-tos, features, reviews, and videos

Hacking stealing password data

SolarWinds Trojan: Affected enterprises must use hot patches, isolate compromised gear

SolarWinds is recommending that customers hit by the Trojan embedded in a version of its Orion network-monitoring platform update to a new release of the software as Microsoft, Cisco, others weigh in.

Russian hammer and sickle / binary code

SolarWinds attack explained: And why it was so hard to detect

A group believed to be Russia's Cozy Bear gained access to government and other systems through a compromised update to SolarWinds' Orion software. Most organizations aren't prepared for this sort of software supply chain attack.

Remote worker  >  A man works from home with his dog

Strike a balance: Ensuring secure remote work without hindering productivity

The expanded remote workforce requires a balanced, secure approach to accessing data, apps, and systems.

hands cropping picture frame arrows trends forward thinking future trends by photo by ian noble on

10 future trends and how CIOs can keep ahead in 2021

After a year disrupted by a global pandemic, the next normal is starting to take shape. Here's a look at what's ahead for IT organizations.

chess strategy strategic data binary game by santoelia getty images

5 ways to take control of data in 2021

COVID-19 is transforming the way the economy works, guaranteeing that our data needs will also change and grow. Here's what that means for CIOs in the year ahead.

cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

Consumer-targeted phishing and fraud are rising in time for a COVID holiday season

A most unusual e-commerce season puts pressure on retail CISOs to protect customers from cyberattacks

interconnecting gears / process / automation / machinery / mechanism / efficiency

CIOs on the hook for governance as automation rises

With business leaders increasingly pushing for automation, CIOs must step up to help guide how and where such technologies should be deployed.

Remote worker  >  A man works from home with his dog

Many of us will be working from home forever

The future of work is here, and for many of us it's going to be from home.

ransomware attack

Hospitals need to practice their security hygiene just like handwashing

Amid heightened cyber-threats, healthcare providers should reinforce four fundamental security routines

Eric Jimenez, CIO, Artesia General Hospital

Lessons from COVID: Futureproofing your IT infrastructure

IT leaders are leveraging the pandemic’s real-life stress-test to rethink IT strategy around building resiliency for an uncertain future.

one businessman floats above a crowd of struggling/failing ballonists

How did your continuity plan stack up against Covid?

Now that things are stabilizing, it's time to evaluate how well your business continuity plans handled Covid and where you need to make changes.

bucket with holes breach security vulnerability

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Co-workers maintain social distancing as signs mark chairs to remain vacant in a post-COVID office.

Returning to the workplace: IT’s role

IT and security teams must prepare for three different workforce scenarios to keep productivity levels high

artificial intelligence / machine learning / binary code / neural network

Towards smarter security

Is your network context-aware? Machine learning can help.

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Inside Adobe's employee-focused COVID-19 response roadmap

A comprehensive business continuity blueprint and advance planning paved the way for Adobe's rapid work-from-home transition, but the focus on employee experience was the key to success.

coronavirus remote worker work from home romolotavani getty

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for...

COVID-19 coronavirus morphology / network of cells

7 steps to prepare IT for a second-wave COVID-19 outbreak

Lessons learned to date promise to help IT weather a second round of COVID-19 lockdowns this winter. Following a few basic suggestions could spell the difference between a trouble-free transition to remote teams and a viral meltdown.

Multiple individual cloud instances / cloud deployments

CIO Think Tank: Setting the multi-cloud agenda

How can enterprises handle the complexity of multiple clouds — and reap unprecedented benefits? In a series of virtual roundtables, 30 IT leaders articulated the challenges and delivered insightful recommendations.

data explosion / data streams / volume / velocity

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

Load More