CSO staff

The CSO guide to top security conferences

Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

4 historic security events of 2016 and what they teach us [Infographic]

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Top celebrity online security screwups in 2016

Top celebrity online security screwups in 2016

Password manager announces its inaugural "P@ssholes of the Year" list. The list highlights the high-profile people and organizations that experienced the biggest password-related blunders of 2016.

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

If you’re like most organizations, you think that you’ve got the right controls in place to deal with cyber attacks. But how prepared are you? The results of a recent survey might surprise you.

November 2016: The month in hacks and breaches

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers.

Who's responsible for data compliance? 25% of executives don't know

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

3 ingredients of a successful attack

3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive.

12 steps to lower your espionage risk

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

Why senior managers are the most dangerous negligent insiders

Why senior managers are the most dangerous negligent insiders

If you really want to move the needle on data security in your organization, start at the top.

SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

Research director Scott Tenaglia and lead research engineer Joe Tanen detailed the vulnerabilities during their talk at the Black Hat Europe conference in London last Friday. The zero-day flaws specifically relate to Belkin’s smart...

Do you know where your sensitive documents are?

Do you know where your sensitive documents are?

If your employees aren't even aware of what document management tools your organization uses — and that's true for 20% of them, according to a recent survey — you've got some serious policy enforcement issues.

Load More