Employee Protection

Employee Protection news, information, and how-to advice

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

7 strategies for a successful DLP strategy

Investing in DLP technology can be costly and time consuming. Sapient's CISO Curtis Dalton offers tips on starting slow for an effective plan


Big Data still 'a new frontier' for most of the public sector

NSA surveillance technology is cutting edge, but for most of the government, Big Data analytics is a promise unfulfilled

Top 5 skills needed for a SOC analyst

Whether building a new Security Operations Center or revamping an existing one, staffing it with analysts that are equipped with the proper skills sets should be priority number one, says Palo Alto's Rick Howard (registration required)

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The cost of doing business at the RSA Conference

As attendance at the yearly conference rises, so do the costs of space on the expo floor, creating a debacle for smaller companies

I, journalist: public enemy number one

The journalists are the problem with global security? Well, if General Keith Alexander had his way they'd all be rounded up and dropped in a deep dark hole. Seems that his frustration has gotten the better of him.

Survey: IT pros not concerned about NSA spying

Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals

Ukraine says Russia is attacking digital infrastructure

In a press statement on Tuesday, Valentyn Nalivaichenko, the head of Ukraine's SBU security service, told reporters that the mobile and Internet infrastructure is under attack by Russian forces.

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

The risk of offshoring security

Outsourcing across all industries has become commonplace, but as the InfoSec Institute's Kim Crawley points out, the economical and security issues of such a trend may cause irreparable damage

Slideshow

In Pictures: RSA Conference 2014

CSO traveled to San Francisco, CA last week in order to attend the RSA Conference, touted as the largest security event in North America. Here's a visual recap of the event from the show floor.

SANS seeks feedback in salary survey

SANS is asking for security professionals to weigh in on their latest salary survey

Slideshow

Hot, new products from RSA

Our roundup of new security products on hand at this week's show.

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Why security should monitor social media to prevent violence

Behavior on social media can offer clues to potential threats of violence against an organization and its employees. Here are some tips for why and how security managers can keep an eye on social media to mitigate future problems

EU executive body supports less U.S. influence on Internet

NSA revelations prompt push for globalization of the Internet Corporation of Assigned Names and Numbers

Study shows those responsible for security face mounting pressures

Trustwave report shows year-over-year increase of pressures on InfoSec leaders

Can threat modeling keep security a step ahead of the risks?

CSOs need to more precisely understand the actual threats facing their organization. The fix? Threat modeling

Social Media and Compliance: Overview for Regulated Organizations

The growing use of social media in business today is undeniable. Social media is fast, ubiquitous, and in many cases produces measurable ROI to a business; however, it also poses significant risks that can become public and

Does your title match your authority?

Security may be getting more respect at the executive table, but how much does a C-level security title really mean when it comes to having the power to secure an organization?

How to use Syrian Electronic Army attacks to improve security awareness

Ira Winkler and Samantha Manke suggest exploiting the Syrian Electronic Army and Target hacks to improve your organization's security awareness

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

Load More