Security

data explosion / data streams / volume / velocity
broken lock amid binary code and circuits

Cybersecurity lock with the abstract circuitry of a security fabric.

What is the Risk Management Framework (RMF)? A standardized security framework

Risk management and security are top concerns for most organizations, especially in government industries. The Risk Management Framework (RMF) integrates security into the early development stages to help speed up time to delivery...

security integration / network of integrated security technologies

Ellie Mae turns to AI for autonomous threat hunting

The mortgage processor is using threat intelligence, predictive analytics, and AI to proactively hunt advanced persistent threats like ransomware.

data science certification man at computer

14 IT certifications that will survive and thrive in the pandemic

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

Virtual connections between a distributed network of teams.

CIOs offer strategies for engaging an entirely mobile workforce

Working from home has been a success operationally, but it has strained people, processes and technology. CIOs discuss the opportunity to make each better in the days to come.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

video conferencing / remote work / online meeting

5 lessons companies should learn about working at home

Companies now have the opportunity to learn from what is and isn’t working during the coronavirus crisis. Use this time to build out a strategy so you won’t have to use band aids and duct tape next time.

floating umbrellas against a blue cloudy sky

Silver linings: Why COVID-19 will encourage a national privacy law

Consensus has formed around the need for a national privacy law; Congress should seize this opportunity.

super computers data center coronavirus covid 19 romolotavani vladimirtimofeev by getty images

Security executives succeeding in the chaotic coronavirus world

What a crazy world we live in – employees working from home, “dirty” personal devices being used to access corporate data, furloughed employees still maintaining corporate IT assets and access – all while the quantity and variety of...

Google Gmail / email / laptop / messaging / collaboration

5 keys to supporting telework effectively and securely

Suddenly countless numbers of people are working from home. This massive shift in work processes can have huge repercussions from a security, privacy, regulatory and data governance standpoint.

pulse heart rate monitor

Exclusive survey: What 400 IT leaders really think about the COVID-19 crisis

How did IT leaders respond to a world turned upside-down? And how has the coronavirus pandemic changed spending plans over the next year? A fresh CIO survey offers illuminating answers.

video conferencing / remote work

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

IDG Insider Pro  >  Tech Career Ladder [podcast / 3:2 / 2400 x 1600]

Tech Career Ladder podcast: Start your climb to EPIC leader

In Insider Pro’s inaugural Tech Career Ladder podcast, Sandy Silk -- director of Information Security, Education, and Consulting at Harvard University -- joins host Maryfran Johnson to discuss what it takes to become an EPIC leader....

security school education classroom books by chuhail and fstop123 getty

Security School: Enroll today and advance your tech career

Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.

4 response time to breach hour glass time clock deadline midnight

When it comes to cybersecurity, we need to adapt for now and the future

As we adapt to a future of remote workers, this is a critical time to ensure you have an incident response plan in place, and can adapt for an indefinite change in operational processes – including who is managing this response.

covid 19 coronavirus global pandemic by smartboy10 getty images binary tunnel by robertiez gettyima

Don’t let the coronavirus make you a home office security risk

Congratulations. You're now the chief security officer of your company’s newest branch office: Your home. Here's how to manage your new job.

Load More