Advertisement

executive pushing boulder uphill deadline stress struggle
Cybersecurity Snippets

5 persistent challenges security pros face

Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report


handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


access management / access control / user connections / identities

7 best practices when selecting a PAM solution

The right PAM solution will enable security and compliance teams to define and enforce robust privileged account policies. So how do you pick the right PAM solution?


Advertisement

One avatar is uniquely identified among others at the center of a bullseye in a digital environment.
Thoughts from the Beltway

New US digital identity legislation promises more secure verification

COVID-19 has exposed the US’s lack of a comprehensive digital identity strategy. If passed, the Improving Digital Identity Act of 2020 will address this need through engagement among federal, state and local governments.


Double-exposure shot of a businesswoman using a mobile phone, binary code and statistical graphs..

Skills and traits of a business-savvy CISO

CISOs looking to advance their careers or land a plum job must prove they are really on top of their game. Here's what recruiters say sets business-savvy CISOs apart.


green mesh rope network connections

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale...


microsoft 365 channel attributes apps

New Microsoft 365 defaults, Application Guard beta add email protections

Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.


Election security  >  Backlit hand drops a vote in a ballot box with US flag + binary code overlay

Election security status: Some progress on ballot integrity, but not on Russian interference

With the election less than two months away, government and election officials say voting itself is more secure, but Russian disinformation remains largely unaddressed.


man typing on laptop search internet web browswer

8 top open source intelligence tools

OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.


IDG Tech Spotlight  >  Edge Computing [ Network World (intro) / September 2020 ]

Edge computing: The next generation of innovation

The future of enterprise tech won't be confined to the data center mothership -- nor even the public cloud. Wedded to the internet of things, edge computing puts processing horsepower wherever it needs to go.


Advertisement

A hacker attacks from within a Windows system.

Windows code-signing attacks explained (and how to defend against them)

Learn how code-signing attacks work and how to defend against them. It starts with patching.


IDG Tech Spotlight  >  Edge Computing [ CSO / September 2020 ]

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.


CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.


CSO: Have you met these hackers? [slide 01]

11 types of hackers and how they will harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.


A virtual checkmark in digital system / standards / quality control / certification / certificates

CMMC bakes security into DoD’s supply chain, has value for all businesses

The Cybersecurity Maturity Model Certification provides a means for the DoD to certify the security capabilities of its contractors, but it's a good way to assess the cybersecurity maturity for all companies.