Advertisement

ransomware healthcare breach hacker
IDG Contributor Network

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target.


multiple-exposure image of dollars, charts, graphs, a globe and a calculator

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.


A team with megaphones promotes their message.

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan.


Advertisement

CSO  >  Digital identity  >  personal identity / recognition + access authentication / personal data

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit.


cybersecurity eye with binary face recognition abstract eye
IDG Contributor Network

Why cybersecurity is a central ingredient in evolving digital business models

Rather than being a hindrance, cybersecurity best practices give you a stable foundation on which to innovate...and can be the can be the gateway to re-imagining your business model.


CSO  >  security shield / binary code / handshake / agreement / contract

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.


BlueBorne Bluetooth attack stage fright
IDG Contributor Network

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.


fedora hat black hat detective spy

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all.


CSO  >  malware / virus / security threat / protective antivirus shield

Best antivirus software: 10 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.


Let's Encrypt automated encryption gears
Cybersecurity Snippets

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.


Advertisement

Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.


international travel / security checkpoint / electronic ticketing/ inspecting personal device

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees.


Windows security and protection [Windows logo/locks]

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.


Las Vegas Sign for Blackhat DefCon Event
IDG Contributor Network

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...


Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.