Security Awareness

Security Awareness news, information, and how-to advice

internet of trousers
Black Hat 2015

scream wheelbarrow nightmare

How to wake the enterprise from IoT security nightmares

Solutions present and future for IoT security scares that keep you up at night.

question man

How to gain the trust of the board

One of the keys that can make a good CSO presentation a great one is by ensuring the data being reported actually has relevance on specific business risks the organization is most likely to encounter (rather than assembling a...

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

head scratcher strategy thinking

Inadequate intelligence integration

Threat intelligence can add value to your security posture but it usually doesn’t.

1 darkweb marketplace

The unseemly world of Darkweb marketplaces

Find out the various characteristics of a variety of underground markets that offer services for cyber criminals to profit from.

blue mannequin fallen

Don't succumb to security fatalism

Protecting ourselves online can be incredibly complicated for anyone who isn't an expert, which has led to the current dismal state of security. Now the time for big changes to make things simpler.

valentine hero

How White Hat hackers do bad things for good reasons

Some companies are love struck with social engineering. White hat hackers are used to poke holes in your network and physical building.

Locky Ransomware infects a Windows 10 computer

Video: Infecting a system with Locky Ransomware

Ransomware is a problem. Businesses, governments, even home users have felt the impact of this malicious criminal enterprise. CSO wanted to demonstrate the speed and devastation that comes with a Ransomware attack, and the only way to...

backwards up slide

Defensive regression in cybersecurity

There has been a lot of talk lately about defensive regression in cybersecurity. But what exactly is defensive regression? It's not the regression that Sigmund Freud talks about, although there are plenty of folks that don't act like...

01 boring

7 tips for better security awareness training sessions

At their worst, security awareness training sessions are boring wastes of time, both for employees and the IT people responsible for them. At their best, however, they are interactive, discussion-driven, and genuinely helpful...

fake lies pinocchio

What fake news means for IT—and how IT security can help fight it

The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about.

training

Increasing the cybersecurity workforce won't solve everything

Many organizations focus on technology to solve their security woes, while desperately trying to hire more security practitioners. But there are other ways to address social cybersecurity challenges. This article discusses the recent...

iphone security

Switch from Yahoo Mail to Gmail, and turn your phone into a physical key

Yahoo suffered the world's biggest hack on 1 billion users. Google is the safest choice for personal email.

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

Remain paranoid, err vigilant, with online security in 2017

You didn’t think we were going to say you can now relax your security awareness training, did you?

phishing threat

Phishing email scams 108 government employees, 756,000 people affected by breach

On Friday, The LA County Chief Executive Office issued a public notice that 756,000 Californians were going to be receiving breach notification letters, after a single Phishing email scammed more than one hundred county employees. The...

donald trump

What 2017 has in store for cybersecurity

There is much uncertainty surrounding the security industry for 2017. Many of the trepidations of experts in the field are directly connected to what the nation’s next president will do. Find out what else worries them.

A man sitting in a chair next to a sign that says Free Advice

Ways to improve security education in the New Year

As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the...

Stack of school books on desk with an apple on top

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Load More