Security Awareness

Security Awareness news, information, and how-to advice

cloud documents
arrows asphalt direction

cybersecurity skills and talent shortage

Cybersecurity staffing issues may be putting you at risk

Cybersecurity is a priority for most businesses, but many are finding a lack of available cybersecurity talent. But not being able to hire the right candidates is no excuse to ignore your security needs.


REVIEW: BIO-key’s plug-in fingerprint readers for Windows 10 computers

BIO-key loaned me these three models for evaluation. I tested them on two notebooks: one running Windows 10 Home, and the other Windows 10 Pro. Find out the results.

shaking hands

CISOs, it’s time to bury the hatchet with your CIO

The Chief Information Security Officer and the Chief Information Officer can be awkward bedfellows. We look at the how the two execs can work better together.

best paying it engineering roles

See how much an infosec analyst can earn

Looking for a job in tech or planning to make a career change? Here is CareerCast's list of the top 10 jobs in IT and engineering in terms of salary, growth and market relevancy.


CIO Career Coach: Acing the interview - Part 2

In the latest installment of CIO's Career Coach, blogger Martha Heller digs deeper into the interviewing process, offering tips and techniques to help you land the job.

security salary

10 highest-paying IT security jobs

IT security is of major concern to all organizations, and they're willing to pay to get top talent.

clinton trump debate

Vote Cyber: Clinton Vs. Trump on World War III

Enter the 'Cyber Party'. Last September, cybersecurity icon John McAfee announced his White House run on the so-called Cyber Party ticket -- a new political party he claimed to be founding. The party never actually formed and McAfee...

yahoo headquarters

The privacy perils of rocks and hard places

J. Trevor Hughes, president & CEO of the International Association of Privacy Professionals (IAPP), examines the privacy dilemmas of today's technology-driven world.

open gate access

Pain in the PAM

In order to prevent security breaches, insider attacks and comply with regulatory mandates, organizations must proactively monitor and manage privileged access. As the compromise and misuse of identity is often at the core of modern...

ISAO standards organization sets guidelines for sharing information

University of Texas at San Antonio (UTSA), the Information Sharing and Analysis Organization (ISAO) Standards Organization, published four guidance documents on creating and operating an ISAO.

power plant railroad tracks

Security convergence in a utility environment

It used to be that physical, operational and IT security were managed in isolation. However, criminals, activists and competitors don’t think that way and will use any vulnerability to gain access to your sensitive systems or...

07 inability

Down but not out of options: How to keep IT security together in a company that's gone bankrupt

If you're working for a company that's filed for bankruptcy, you're definitely going to encounter choppy waters when it comes to maintaining tech security. We talked to IT pros who have been through it to find out the best ways to...

body outline meeting

Time to kill security awareness training

Security awareness is a tired concept and has not worked. It is time to replace it with true education and engagement.

ana montes

Management lessons from the espionage of Ana Montes

The best IT security is not enough to protect against the determined insider

07 breach botch

Why your employees are still a huge security risk

Michael Bruemmer from Experian Data Breach Resolution joins CSO to chat about companies not being tough enough on employees who break security protocols.

lady justice statue

Information security and the flaming sword of justice

There have been times in my career where I found it almost necessary for me to breathe into a paper bag after hearing some asinine positions on what security should be. I have encountered what I like to refer as the “flaming...

jigsaw ransomware logo

Ransomware from Stoned to pwned

When I was in the trenches as a defender I saw all manner of malicious software. The first one I ever encountered back in the late 80s was the Stoned virus. This was a simple program that was lobbying the infected computer...

data breach lessons

Who you gonna call when the crisis comes

There will be times in your career when you know that you will face a crisis. These will be times when things will go horribly and irretrievably wrong. The breach news from Yahoo yesterday is a perfect example. One question that...

Load More