Advertisement

security internet network encryption privacy padlock
Cybersecurity Snippets

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.


CSO > Security automation

New MongoDB field-level encryption can help prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.


shadowy figure reaching out from behind transparent wall
IDG Contributor Network

Forthright handling of cybercrime essential to improved results

While it is has become generally well-known that enterprises have a problem dealing with cybercrime, the true extent of the problem is much worse than many realize. In fact, even the entities that really ought to know the reality –...


Advertisement

mike assante cyber security guru by ryan g poirier

Mike Assante’s lasting impact on critical infrastructure security (and me)

Thanks to Mike Assante, critical infrastructure stakeholders have a better understanding of and ability to respond to cybersecurity risks.


mended relationship / handshake and bandaged heart

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it.


red light / warning / caution / alert / sign of threat or danger
IDG Contributor Network

Emerging security threats at the half-year mark

We’ve hit the halfway mark of 2019, and I’m sure that we have all noticed some interesting happenings in the cybersecurity world. I’d like to highlight a few that I’ve found interesting, but also disturbing – and I am sure that there...


holiday security have i been pwned
IDG Contributor Network

‘Have I Been Pwned’ is for sale, but what is it worth and who will buy it?

The question in my mind about Have I Been Pwned has always been about the value of the service aside from the brilliant analysis and PR generated by its creator, Troy Hunt.


rfp write a proposal document contract signature deal agreement paper by extreme media getty

How to prepare a SOC-as-a-service RFP

Here's how one company structured its SOCaaS request for proposal document. Key takeaway: Don't be afraid to ask for too many details.


dns veteran paul vixie internet pioneer by jamie rain lunch break headshots

DNS hijacking grabs headlines, but it’s just the tip of the iceberg

DNS pioneer Paul Vixie contemplates missed opportunities for improving internet security and advocates for widespread use of DNSSEC, which he helped create, and which he believes would go a long way toward improving DNS security.


keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...


Advertisement

Cisco
Cybersecurity Snippets

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.


mentor coach teacher student collaborate
IDG Contributor Network

Father’s Day and good role models

Father’s Day is a day to celebrate those who take up the role of being one to their children, whether or not they are the biological one, or even the same gender. We need to recognize those who take up that role non-traditionally. We...


best conferences to attend conference convention audience applause clapping by django getty

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


rambleed ram memory card hardware hack breach binary by 13threephotography getty

Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Unlike Rowhammer, which only allows for data corruption, the newly discovered RAMBleed vulnerability provides a way to grab data such as encryption keys from memory.


email security lock breach protocol by microstockhub getty

3 email security protocols that help prevent address spoofing: How to use them

DMARC, DKIM and SPF will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think.