Employee Protection

Employee Protection news, information, and how-to advice

Who put the cockroach in my supply chain?

Businesses have always had concerns about supply chain risks but, for most businesses, those risks involve shipping delays, parts shortages and labor issues. But that’s starting to change as evidenced by CSOonline’s recent coverage on

7 strategies for a successful DLP strategy

Investing in DLP technology can be costly and time consuming. Sapient's CISO Curtis Dalton offers tips on starting slow for an effective plan


Big Data still 'a new frontier' for most of the public sector

NSA surveillance technology is cutting edge, but for most of the government, Big Data analytics is a promise unfulfilled

Top 5 skills needed for a SOC analyst

Whether building a new Security Operations Center or revamping an existing one, staffing it with analysts that are equipped with the proper skills sets should be priority number one, says Palo Alto's Rick Howard (registration required)

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

The cost of doing business at the RSA Conference

As attendance at the yearly conference rises, so do the costs of space on the expo floor, creating a debacle for smaller companies

I, journalist: public enemy number one

The journalists are the problem with global security? Well, if General Keith Alexander had his way they'd all be rounded up and dropped in a deep dark hole. Seems that his frustration has gotten the better of him.

Survey: IT pros not concerned about NSA spying

Despite all of the attention it has received in the media, government hacking ranks low as a concern for security professionals

Ukraine says Russia is attacking digital infrastructure

In a press statement on Tuesday, Valentyn Nalivaichenko, the head of Ukraine's SBU security service, told reporters that the mobile and Internet infrastructure is under attack by Russian forces.

Cloud Computing eGuide

In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read on to learn how to make cloud work for your organization.

The risk of offshoring security

Outsourcing across all industries has become commonplace, but as the InfoSec Institute's Kim Crawley points out, the economical and security issues of such a trend may cause irreparable damage

Slideshow

In Pictures: RSA Conference 2014

CSO traveled to San Francisco, CA last week in order to attend the RSA Conference, touted as the largest security event in North America. Here's a visual recap of the event from the show floor.

SANS seeks feedback in salary survey

SANS is asking for security professionals to weigh in on their latest salary survey

Slideshow

Hot, new products from RSA

Our roundup of new security products on hand at this week's show.

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Why security should monitor social media to prevent violence

Behavior on social media can offer clues to potential threats of violence against an organization and its employees. Here are some tips for why and how security managers can keep an eye on social media to mitigate future problems

EU executive body supports less U.S. influence on Internet

NSA revelations prompt push for globalization of the Internet Corporation of Assigned Names and Numbers

Study shows those responsible for security face mounting pressures

Trustwave report shows year-over-year increase of pressures on InfoSec leaders

Can threat modeling keep security a step ahead of the risks?

CSOs need to more precisely understand the actual threats facing their organization. The fix? Threat modeling

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.

Does your title match your authority?

Security may be getting more respect at the executive table, but how much does a C-level security title really mean when it comes to having the power to secure an organization?

How to use Syrian Electronic Army attacks to improve security awareness

Ira Winkler and Samantha Manke suggest exploiting the Syrian Electronic Army and Target hacks to improve your organization's security awareness

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

Watch out Silicon Valley: Israel’s cybersecurity start-ups are coming

When most people think about Israel, topics like Middle East peace talks or touring Holy Land sites usually come to mind. But over the past few years, a powerful transformation has been occurring in focused areas of science and...

Load More