Advertisement

Abstract blockchain concept  >  Blocks / nodes / connections / transactions

4 blockchain security lessons from Euroclear's CISO

Euroclear is taking a security in-depth approach with its blockchain project. CISO Vincent Laurens shares his experience and offers advice for others looking to get started with blockchain.


A weary businessman holds hand to forehead at his laptop, surrounded by abstract security concepts.

How enterprises can benefit from Cybersecurity Awareness Month

Organizations are working with the US Department of Homeland Security to enhance their own security awareness training and promote it in their communities.


three global network puzzle pieces

Third party risk management: A getting started guide

Your vendor partners may be your organization's weakest link. Without a strong third party risk management program in place, how would you know?


Advertisement

Gears in the form of a cloud in a binary field  >  Cloud controls

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...


Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
IDG Contributor Network

Rising complexity, higher stakes for enterprise risk management

As the pace of business and a shifting threat landscape challenge enterprises, optimizing risk has become a moving target.


CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.


GDPR data privacy / protection / regulation / security / compliance / documentation / data / records

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR.


rfp write a proposal document contract signature deal agreement paper by extreme media getty
IDG Contributor Network

4 key vendor contracting pitfalls

Unless these 4 pitfalls are avoided, a vendor can have the absolute best security documents in the industry and still present material risk to its customers.


aerial view of a network of roads
IDG Contributor Network

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.


Advertisement

A shoe about to step on a banana peel, stopped by a small superhero.

10 risk factors no one talks about

These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.


conference speaker + audience

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


cryptojacking / cryptocurrency attack

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.


Microsoft-based election, campaign systems

How to secure Microsoft-based election, campaign systems

Microsoft has issued guidance and provided resources for local election bodies and candidate campaigns to help protect systems and communications.


Linux security shield

Top Linux antivirus software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection.