Advertisement

facial recognition - biometric security identification

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?


cybersecurity  >  information security / data protection / lock / shield

What is information security? Definition, principles, and jobs

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.


multicloud

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.


Advertisement

teamwork / collaboration / developers / development / engineers / binary code / virtual interface

Vulnerability management requires good people and patching skills

Multinational construction materials maker LafargeHolcim focuses hard on patching to prevent potential exploits further down the line.


digital identity / authentication

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year.


secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.


Microsoft Windows  >  Defending against attacks

3 ways to make your Windows network harder to attack

Start the new year right by checking these three areas for potential vulnerabilities in your Windows network. Don't make it easy for attackers.


cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Introducing ‘CSO Executive Sessions’

Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions, which will feature conversations with leading security and risk executives from around the country about the challenges faced by their...


A man looks through a magnifying lens at a group of figurines.

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship.


mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.


Advertisement

cloud security / data protection / encryption / security transition
Cybersecurity Snippets

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits.


Lock with a question mark-shaped keyhole in a network of circuits + binary / digital transformation

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.


security posture / cybersecurity landscape / binary eye / locks / keyholes / firewall / gears
InfoSec at Your Service

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges.


audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


Demand for talent  >  Two business people compete for a third in a tug of war

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality.