CSO staff

The CSO guide to top security conferences

11 tips to prevent phishing

11 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

Phishing: The basics

Phishing: The basics

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. Because the best defense is a skeptical user, here's...

Security executives on the move and in the news

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

IDG Security Day features events in 9 countries

IDG Security Day features events in 9 countries

On June 21, IDG Enterprise will follow the sun and discuss the challenges organizations across the globe face when attempting to identify or mitigate risk. To do this, IDG has organized Security Day, a global event that is coming to...

GDPR requirements raise the global data protection stakes
Infographic

GDPR requirements raise the global data protection stakes

New European Union data protection rules go into effect in 2018. Will you be ready?

The CSO IoT security basics survival guide

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

Stopping ransomware starts with the security pros
Infographic

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

April 2017: The month in hacks and breaches
Infographic

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April.

Three shades of hackers: The differences among the white, grey, and black hats

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

Report: Bad policies and practices put data at risk [Infographic]

Report: Bad policies and practices put data at risk [Infographic]

The 2017 Varonis Data Risk Report shows the scope of the risk associated with corporate data files.

"Hack the Pentagon" creator joins GRIMM as principal for security consulting

Lisa Wiswell brings a strong background in security and defense, as well as credibility with the hacker community.

Load More