Features

marketing automation gears

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

16 automation

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies that enterprises can put to use - if they have already laid the required ground work....

5 small business security

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

big data risks

Report: Bad policies and practices put data at risk [Infographic]

The 2017 Varonis Data Risk Report shows the scope of the risk associated with corporate data files.

board game start

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving security in some industry segments, and has the potential to do more -- if the industry is able to address its data problem

hurdling woman track

CSO50 winners remain a step ahead

Check out the 50 winners to be lauded at CSO's annual award ceremony. This year’s winners are designing security to stay in front of modern threats.

security tools intro slide

9 security tools for the mobile worker

From a webcam cover and laptop lock to a USB port blocker and an encrypted flash drive, we've found some security- and privacy-centered gadgets you will want to keep handy.

1 intro insider threat

Sensitive data often follows former employees out the door

Almost 70 percent of employees take data on their way out. Here's how to stop it.

multifactor authentication

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

shield protection

15 tricks to hold off the hackers

To root out persistent hackers, sometimes you have to get a little creative

Open Source sign in yellow field against blue sky

Open source security risks persist in commercial software [Infographic]

Black Duck’s second annual Open Source Security and Risk Analysis report shows that commonly used infrastructure components have high-risk vulnerabilities.

us flag blackboard chalk

Five ways the U.S. is educating cybersecurity talent – and what’s still missing

It’s no secret that the world is facing a shortage of cybersecurity talent. Many industry analysts agree that the underlying problem is the lack of education in cyber skills – in high schools, colleges, post grad and on the job.

three lone doors in open grassy field

How CISOs find their perfect job

The Chief Information Security Officer (CISO) is in high demand. But in a world where demand heavily outstrips supply, how do CISOs ensure they pick the right job?

controlling privacy

How to track and secure open source in your enterprise

Your developers are using open source — even if you don't know about it. Here's how to take control and why you need to.

computer ports secure issue

Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

H-1B visa Statue of Liberty America

Cybersecurity industry braces for tighter visa rules

The current climate surrounding visas, immigrants and international travel will change the way some tech companies operate, and may harm US cybersecurity -- but there is also a chance that it will inspire more Americans to enter the...

walking dead cloud zombies apocalypse

Don't get bit by zombie cloud data

Data you thought you had deleted from the cloud can come back to haunt you. Get to know your provider’s data deletion policy

Family in silhouette waving goodbye at airport

Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

1 transform phone payment

10 ways Trusted Identities are used

It is always a struggle to control who gets into your network. A third-party might need access for the contractual work they are doing. HID Global runs through some ways trusted identities are used.

Load More