Features

windows 10 hidden revealed

The need for a security leader revealed through cyber insurance

A risk manager explains how learning about cyber insurance drove the creation of the CISO position and key changes across the business

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

veterans fill cybersecurity gap2

Companies ramp up recruiting veterans as cybersecurity urgency grows

Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.

The modern guide to staying safe online

The modern guide to staying safe online

Keeping safe and productive online requires smart decision-making and just the right preventive measures to fit the level of risk you can live with.

ryan benson

A day in the life of a threat researcher

After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.

small business bakery

Why security leaders need to support small business cyber insurance efforts

Carter Schoenberg explains the challenges of SMBs and the role cyber insurance plays to protect them today while preparing them for coming threats

shadowy attacker hooded (public domain)

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

trojan horse virus

Blackmoon banking trojan returns with new framework

Fidelis Cybersecurity describes the new way Blackmoon was delivered to South Korean financial institutions and offers advice for preventing future attacks.

tatu ylonen

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

insurance cyber attack protection

What security leaders are surprised to learn about cyber insurance

Jason Christopher reveals some surprising insights on what cyber insurance offers for security leaders and how to take advantage of these benefits

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

containers

Secure platforms as a service allow you to focus on function

Learn what to expect from this new class of security-focused, container-based cloud platforms.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

1 kids intro

Teenagers who became hackers

There is of course a very long history of young people getting involved in hacking—it's become almost something of a cliché. We'll take a look at the trouble teens have managed to get into online since almost the beginning of "online"...

future jobs 1

Security among the hot jobs of the future

It is clear that new technologies like robotics, self-driving cars, 3D printing, drones, artificial intelligence and virtual reality will create major upheavals in all sorts of labor markets, not just technology. (Think self-driving...

rescue recovery data binary sea ocean lifesaver

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.

sprout plant watering garden

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security.

Load More