Features

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world
supply chain management logistics - ERP - Enterprise Resource Planning

hot and cold fire and ice clash temperature

8 hot cyber security trends (and 4 going cold)

What trends do security pros have their eyes on? Their answers run the gamut from tools and technologies to threats, tactics, and training.

Agile Development
video

How the agile methodology really works

Everyone seems to be talking about agile software development, but many organizations don't have a firm grasp on how the process works. Watch this 5-minute video to get up to speed fast.

futuristic user interface - digital transformation

What is security’s role in digital transformation?

Digital transformation is front of mind for many senior executives, but too often security is left behind.

Black Hat 2015

The CSO guide to top security conferences

News online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

fog visibility island

Security vs. visibility: Why TLS 1.3 has data center admins worried

A number of data center administrators from large financial, health care and retail corporations have begun to regard the current draft of the 1.3 version of the TLS protocol with increasing alarm. The issue comes down the tussle...

Healthcare professional and security

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats.

partnership collaboration puzzle pieces unity

Third-party security vetting: Do it before you sign a contract

Security needs to ensure that all vendors and partners, even those not controlled by IT, meet the organization's security standards.

multiple-exposure image showing virtual connections and software inside and outside a human profile

What is a virtual CISO? When and how to hire one

A virtual CISO (vCISO) can bring both strategic and operational leadership on security to companies that can't afford a full-time person in the role.

bunch of toy robots

The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet

Mirai took advantage of insecure IoT devices in a simple but clever way. It scanned big blocks of the internet for open Telnet ports, then attempted to log in default passwords. In this way, it was able to amass a botnet army.

rsa conference 2016

Making the most of your time at the RSA 2018 conference

A guide to the RSA 2018 conference. Going to RSA 2018? Failing to plan is planning to fail.

credit card fraud

Inside RSA's state-of-the-art fraud intelligence command center

RSA’s Anti-Fraud Command Center helps financial services firms stay a step ahead of fraudsters and criminals. The ultimate goal: Someday make it not worth their effort to even try.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

From virtual bank heists to semi-open attacks from nation-states, the last couple of years has been rough on IT security. Here are some of the major cyber attacks of 2017-2018 and what we can learn from them.

capture the flag hackathon face off

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and other logistics to consider.

European Union [EU] flag-lock on top of a map of Europe

Beware the GDPR vaporware

NetApp’s legal head Sheila FitzPatrick on why companies can’t simply buy or outsource their way to GDPR compliance.

template c100.00 01 13 23.still001
video

What is geofencing? Putting location to work

Geofencing is a service that triggers an action when a device enters a set location. From coupons and notifications, to engagement features and security alerts — businesses are finding creative ways to use these virtual boundaries.

man with megaphone yelling buzzwords

10 security buzzwords that need to be put to rest

Having trouble getting your message across? Banning these buzzwords may help.

4 compliance

14 top tools to assess, implement, and maintain GDPR compliance

Running behind on meeting the EU’s new GDPR privacy rules? These tools can help you meet the requirements and stay in compliance by deadline.

cso50 2018 digital magazine

CSO50 2018: Security risk management takes center stage

Nearly 20 percent of this year’s CSO50 Award winners took on security risk and compliance projects. Download the CSO50 2018 digital issue to read their stories, as well as descriptions of all 50 winning projects.

Load More