Features

construction building crane architecture

hiring software developers

Four ways to use open data sources to find cybersecurity candidates

Publicly available data from government and other sources can help you find the right security talent.

Black Hat 2015

The best of Black Hat: The consequential, the controversial, the canceled

Over the past two decades, the annual Black Hat conference has had its share of controversy. CSO looks back at the most significant talks and demonstrations.

we're hiring sign jobs careers public domain

Six entry-level cybersecurity job seeker failings

More cybersecurity job openings mean more entry-level candidates are entering the market. These are the common mistakes they make when apply and interviewing for an opening.

balloons in sky celebration party

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for — and how to protect yourself and...

ransomware

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

citrix pt2
video

Interview: Tim Minahan, SVP & CMO, Citrix - part 02

Tim Minahan, Chief Marketing Officer and SVP of Citrix, discusses how Citrix uses data to predict customer needs and engagement readiness, Citrix’s content marketing approach and the importance of industry events in building...

dark web hacker tablet malware

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

Talent compass to recruit and hire the right skills.

How to write an information security analyst job description

A thorough, clear job description will ensure that security analysts stay on the same page with management expectations.

hacking cybercrime cybersecurity internet coding programming code

What is CVE and how does it work?

The Common Vulnerabilities and Exposures (CVE) Program has been cataloging software and firmware vulnerabilities for 18 years. Here’s how it can help you secure your company’s network.

phishing threat

Phishing: The basics

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Typically, a phisher sends an e-mail disguised as a legitimate business request. Because the best defense is a skeptical user, here's...

Davis-Besse Power Station in Oak Harbor, Ohio

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best.

graduatation degree

Guide to the top college and university cyber security degree programs

CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place young professionals into the...

pacemaker xray

Medical devices at risk: 5 capabilities that invite danger

It isn't just certain connected medical devices that put patient data and physical safety at risk, it's specific capabilities and systems within which they operate that make them a broad, and vulnerable, attack surface.

coal power station

Critical Infrastructure Protection (CIP): Security problems exist despite compliance

CIP is just one of 14 mandatory NERC standards that are subject to enforcement in the U.S. However, it gets a good deal of attention because this regulation is centered around the cybersecurity of assets deemed to be critical to the...

European Union EU

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...

Stack of legal documents with compliance and regulatory stamp

What are the GDPR requirements?

Here’s how the General Data Protection Regulation (GDPR) will change how companies process, store and secure EU customer data.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

04 insider threat

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

Load More