Advertisement
The biggest data breach fines, penalties and settlements so far
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.
Security Recruiter Directory
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Security Intelligence
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.
Advertisement
17 types of Trojans and how to defend against them
Trojan malware comes in many different types, but all require a user action to initiate.
Hashing explained: Why it's your best bet to protect stored passwords
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
Top SolarWinds risk assessment resources for Microsoft 365 and Azure
Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.
Lohrmann on GovSpace
3 security career lessons from 'Back to the Future'
You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.
US bulk energy providers must now report attempted breaches
US bulk energy providers must now report attempted breaches as well as successful breaches. Guidance is murky over what constitutes an "attempted" breach.
What IT leadership looks like in 2021
As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.
Top 7 security mistakes when migrating to cloud-based apps
As organizations rush key apps to the cloud to support remote workers, they often create opportunities for attackers. These are the most common mistakes to avoid.
Advertisement
Strengthen and Streamline Your Security
Episode 1: Balancing act
Episode 1: In this episode of the Strengthen and Streamline Your Security podcast, we look at how an identity-based security framework can help organizations let users work from anywhere while securing them seamlessly. We’ll hear...
The 15 biggest data breaches of the 21st century
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
4 ways attackers exploit hosted services: What admins need to know
Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.
33 hardware and firmware vulnerabilities: A guide to the threats
Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.
Checks and Balances
SolarWinds hack is a wakeup call for taking cybersecurity action
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by AT&TCreating a Zero Trust Foundation
-
Sponsored by FortinetPublic Agencies Uncover Numerous Opportunities With Fortinet’s Fabric
-
Sponsored by CyberMaxxRansomware Attacks: Don't Think It Can Happen to You?