Features

help support advice guidance signpost
03 bounty hunter

maze lost question direction wayward

5 common ways businesses lose valuable data

David Zimmerman, CEO and Founder of LC Technology, lists five ways individual employees and IT are causing companies to lose data, and some best practices for preventing a crippling data loss.

data recovery

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready

windows 10 hidden revealed

The need for a security leader revealed through cyber insurance

A risk manager explains how learning about cyber insurance drove the creation of the CISO position and key changes across the business

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

veterans fill cybersecurity gap2

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

dsc05165
video

iPhone 7 Plus vs Samsung Galaxy S8+ | Camera Shootout

The iPhone 7 Plus is the best iPhone camera on the market, but how does it compare against the latest Samsung flagship, the Galaxy S8? We put both cameras to the test.

small business bakery

Why security leaders need to support small business cyber insurance efforts

Carter Schoenberg explains the challenges of SMBs and the role cyber insurance plays to protect them today while preparing them for coming threats

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

template c100.00 00 06 25.still001
video

Watch: Vint Cerf on inventing the Internet, defending Al Gore

In this far-ranging interview from 2001, "Father of the Internet" Vinton Cerf recalls having to "shove TCP down people's throats" and lobby for government permission to commercialize the 'Net.

trojan horse virus

Blackmoon banking trojan returns with new framework

Fidelis Cybersecurity describes the new way Blackmoon was delivered to South Korean financial institutions and offers advice for preventing future attacks.

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

insurance cyber attack protection

What security leaders are surprised to learn about cyber insurance

Jason Christopher reveals some surprising insights on what cyber insurance offers for security leaders and how to take advantage of these benefits

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

containers

Secure platforms as a service allow you to focus on function

Learn what to expect from this new class of security-focused, container-based cloud platforms.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

Load More