Advertisement

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
IDG Contributor Network

Rising complexity, higher stakes for enterprise risk management

As the pace of business and a shifting threat landscape challenge enterprises, optimizing risk has become a moving target.


CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.


GDPR data privacy / protection / regulation / security / compliance / documentation / data / records

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR.


Advertisement

rfp write a proposal document contract signature deal agreement paper by extreme media getty
IDG Contributor Network

4 key vendor contracting pitfalls

Unless these 4 pitfalls are avoided, a vendor can have the absolute best security documents in the industry and still present material risk to its customers.


aerial view of a network of roads
IDG Contributor Network

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.


A shoe about to step on a banana peel, stopped by a small superhero.

10 risk factors no one talks about

These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.


conference speaker + audience

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


cryptojacking / cryptocurrency attack

Cryptojacking worm infects exposed Docker deployments

Graboid is the first known instance of a cryptomining worm used to create botnets spread using containers.


Microsoft-based election, campaign systems

How to secure Microsoft-based election, campaign systems

Microsoft has issued guidance and provided resources for local election bodies and candidate campaigns to help protect systems and communications.


Advertisement

Linux security shield

Top Linux antivirus software

Malware attacks on Linux systems are on the rise. These free and low-cost tools provide good endpoint protection.


Cybersecurity awareness  >  A weary businessman holds hand to forehead at security training.
IDG Contributor Network

Cybersecurity Awareness Month: Increasing our self-awareness so we can improve security

With the increased prominence of cybersecurity in organizations due to many crippling cyberattacks, the emphasis is now on continual engagement, as it should be. It’s also important to address the tunnel vision that has plagued the...


Business ethics  >  Handshake extended in trust / reliability / transparency

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind.


Tor Browser  >  private / anonymous web browsing / binary onion

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.


ip cw salarysurveyprimary 2020 coins by josh appel via unsplash

Take part in the 2020 IT Salary Survey

Whether you’re scouting out a new job or looking to fill a key IT role, access to salary data is an important tool. Help us help you by taking our 10-minute IT Salary Survey.