Advertisement

security firewall breach hacker privacy battle id work getty

How to defend against scams: 14 red flags everyone needs to be aware of

Does your security awareness training program help your employees learn when someone is trying to scam them?


IoT > Internet of Things > network of connected devices

Over 90% of data transactions on IoT devices are unencrypted

A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices.


GDPR / data privacy / protection

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.


Advertisement

Android Notifications
IDG Contributor Network

Moving beyond template-based notifications

How to identify your gray area stakeholders for more effective incident response communications.


windows 7 logo on mirrors man with derby hat on dock

How to isolate a Windows 7 machine from your network

If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network.


tip of the iceberg data breach hacked cyber security

Why reported breaches are the tip of the iceberg

Thousands of businesses are breached every day without them even knowing it, compromising payment card data. The EMV chip isn’t the solution, but data devaluation can reduce the impact.


CSO > Formula One- / Formula 1- / F1-style modeled wireframe race cars with abstract circuit overlay

Haas F1 team leans on service providers as security force multipliers

Formula One racing is expensive and comes with significant security concerns. An outsource-first policy lets a small security team effectively deal with threats at multiple locations.


An engineer reviews strategy framework data.

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment.


passwords exposed authentication hacked vulnerable security breach

IT services giant HCL left employee passwords, other sensitive data exposed online

HCL left employee passwords, customer project details, and other sensitive information exposed online with no authentication.


network security / network traffic scanning connected devices

Review: How Awake Security uncovers malicious intent

This advanced network traffic monitoring platform identifies hidden threats and those that don’t use traditional malware, making it extremely powerful and useful in today’s threat environment.


Advertisement

drafting military for cyber security cybersecurity govenment

Will the U.S. government draft cybersecurity professionals?

A Congressional commission might soon recommend conscription of cybersecurity professionals to serve in both the military and civil service. Will the government force security pros to work for Uncle Sam?


CSO  >  danger / security threat / malware / binary skull overlaying binary code

What is malware? How to prevent, detect and recover from it

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it.


ethics typewriter keys values morals
IDG Contributor Network

Digital ethics rising in importance

We must keep in mind that just because we have the ability to deploy a new technological innovation does not mean that we should. The need to prioritize digital ethics is becoming increasingly important for all organizations that are...


overwhelmed man stressed analytics information overload
Cybersecurity Snippets

The most stressful aspects of being a cybersecurity professional

Keeping up with IT, educating users, and working with the business top the list of the most stressful things of being a cybersecurity professional.


CSO  >  secure mergers + acquisitions / handshake offer / extended hand / security shield / circuits

Why security needs to be involved early during mergers and acquisitions

M&A security can often be overlooked during deal making, leading to potential incidents down the line. Here's how UK newspaper Racing Post dealt with three acquisitions in three years, each with its own security requirements.