Feature

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

Cisco’s David Goeckeler talks security, networking, software and SD-WAN outlook

Goeckeler, Cisco executive vice president and general manager, masterminds the company’s network and security strategy which now features ever more emphasis on software.

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

5 major cyberattacks and hacks of 2017

As we approach IDG Security Day on June 21, here is a glance at the major hacks, threats and ransomware attacks that shook the industry last year.

Apple and Google harden their smartphones against hackers and governments

As techniques used by criminals and law enforcement become known, the two leading smartphone makers are adapting to protect user data.

The top blockchain jobs you need to know about

Blockchain development is the hottest IT job skill today; knowing what companies want is key to landing a high-paying and challenging job working with the still-emerging distributed ledger technology.

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage.

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

GDPR is here. Are you ready?

Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.

IT leaders ready to embrace GDPR regulation; compliance challenges remain

IT leaders across the globe gear up to achieve compliance with General Data Protection Regulation (GDPR) which is just about to go live.