Advertisement

cloud migration shipping company outsourcing global consolidation
IDG Contributor Network

Modernized maritime industry transports cyberthreats to sea

Attackers are equally capable of wreaking havoc whether their target is based on land or sea. Considering that more than 70 percent of the earth is covered by water, and an expanding attack surface for the vessels journeying across...


Bitcoin cryptocurrency falling.

Lack of trust will doom crytpocurrency

Loss of crypto coins through hacks, fake trading and volatility destroy trust in cryptocurrency, but those aren't its only problems.


A group of business leaders / board members with questions.

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone.


Advertisement

microsoft windows bitlocker encryption desktop pc monitors

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help.


CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.


Composite image of binary code and biometric fingerprint scanning authorization.

Companies with zero-trust network security move toward biometric authentication

According to new research, more companies are enabling biometric authentication on devices to verify access requests.


cso siem visibility gap in security apps legacy eyes crack breach privacy

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.


CSO  >  What is a computer virus?

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.


login credential - user name, password - administrative controls - access control - single sign-on

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.


CSO  >  ransomware / security threat

To pay or not pay a hacker’s ransomware demand? It comes down to cyber hygiene

A recent call for city leaders to stop paying ransomware demands underscores the need for municipalities to step up their cyber practices and have a good backup process in place.


Advertisement

bridging a gap
Cybersecurity Snippets

How organizations are bridging the cyber-risk management gap

To bridge the cyber-risk management gap, organizations plan to get CISOs more involved with the business, focus on data security, hire staff, and provide more security awareness training.


best conferences to attend conference convention audience applause clapping by django getty

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


distributed / decentralized network connections across the globe
InfoSec at Your Service

How a decentralized cloud model may increase security, privacy

A new cloud model can support scalable applications while retaining safeguards of a decentralized, trust-minimized ecosystem.


teamwork trust hands
IDG Contributor Network

Trust isn't new, so why are we acting like it is?

The industry is missing the mark when it comes to understanding – and protecting – this high value asset.


Conceptual blockchain imagery.

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead.