Advertisement

Check mark certificate in a binary tunnel / standards / quality control / certification / certifi

4 best practices for managing and tracking SSL and TLS certificates

Do you know what SSL protocols you expose to your users? Are your settings optimized for security? Have you properly deprecated older TLS certs? Here's what you need to know.


Christina Quaine, CISO, SVP Technology Operations, AvidXchange, Inc.

CISO Q&A: How AvidXchange manages COVID-related threats and risk

Like many CISOs, Christina Quaine's team is supporting the payment processor's work-at-home employees and managing internal pandemic-specific risks. It also helps its mid-market customers meet new security challenges.


team management / teamwork strategy

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better...


Advertisement

CSO Executive Sessions [podcast logo]
CSO Executive Sessions

Episode 11: TikTok don’t stop: Data privacy and the transparency imperative

Podcast Episode 11: Listen now as Roland Cloutier, Global CSO at TikTok, joins host Bob Bragdon to discuss the challenge and opportunity he took on when joining the fast-growing social media startup.


intro ts ai ml by monsitj getty images 2400x1600

AI and machine learning: Powering the next-gen enterprise

IT leaders are already starting to reap the rewards promised by AI and machine learning -- and a recent survey reveals half are considering greater investment as we hit economic headwinds.


incoming emails / DNS security / locked server / parked domain

18 (new) ways attackers can compromise email

Researchers have discovered eighteen new vulnerabilities in how email systems authenticate senders, making it even easier for criminals to fool users.


cso ts ai ml by just super getty images 2400x1600

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.


Industry 4.0 / Industrial IoT / Smart Factory / Engineer conrols robotics via tablet.

Protocol gateway flaws reveal a weak point in ICS environments

Research presented at this week's Black Hat conference highlights a new threat via protocol translation attacks and reveals 9 flaws found in protocol gateways from different vendors.


Lock with a question mark-shaped keyhole in a network of circuits + binary / digital transformation

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


Advertisement

A mobile phone with virtual security framework overlay.

What the use of open banking means for identity networks

By connecting identity data from multiple sources through APIs, the open banking concept can help verify identity more reliably and improve the customer experience.


computer crime scene / hacked / infected / cybercrime / cyberattack

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked.


Triangular alert with exclamation mark amid abstract binary and sketches of scattered books.

What is a dictionary attack? And how you can easily stop them

A targeted form of brute force attack, dictionary attacks run through lists of common words, phrases, and leaked password to gain access to accounts.


security access / authorization / login credentials / username / password / mobile phone

8 steps to protecting login credentials

Follow this advice to help users and network admins to better protect login credentials to corporate systems.


Multiple individual cloud instances / cloud deployments

CIO Think Tank: Setting the multi-cloud agenda

How can enterprises handle the complexity of multiple clouds — and reap unprecedented benefits? In a series of virtual roundtables, 30 IT leaders articulated the challenges and delivered insightful recommendations.