Advertisement

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Managing vendor and supply chain risk in a recession

The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.


A conceptual representation of accessing username and password credentials.

Hashcat explained: Why you might need this password cracker

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.


digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.


Advertisement

Failure frustration anger user man worker

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.


Cybersecurity  >  Email security threats, such as phishing

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.


Cybersecurity lock with the abstract circuitry of a security fabric.
Security Intelligence

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.


A hacker looks out over a city amid graphs of increasing trend lines and numerical rates.

Cybercrime in a recession: 10 things every CISO needs to know

Economic downturns force cybercriminals to change focus and creates conditions for new criminals to join their ranks. Here's how to prepare.


Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.


Aerial view of the United States as a nationwide grid.

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.


Advertisement

examining / analyzing / selecting / business data / statistics / analytics
Cybersecurity Snippets

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.


A computer monitor displays code and a pixelated skull, surrounded by virus wireframes.

How to protect Office 365 from coronavirus-themed threats

Microsoft's new Office 365 security defaults and OAuth 2.0 support will help meet new US government recommendations to thwart COVID-related attacks, Make sure they are properly implemented.


cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.


a clock half-submerged in water

Cloud configuration drift leaves organizations open to attack, research finds

Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat.


Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for running a successful virtual meeting

Running an online meeting can be as easy as running an in-person meeting if you follow a few simple steps. Here are five tips for taking your meetings online without missing a beat.