Features

A hacker looks out over a city amid graphs of increasing trend lines and numerical rates.
Selecting the right people.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for running a successful virtual meeting

Running an online meeting can be as easy as running an in-person meeting if you follow a few simple steps. Here are five tips for taking your meetings online without missing a beat.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Passwordless authentication, Chromium-based Edge support

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 2004 feature release.

An unknown number calls a mobile phone amid pixelated data.

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

covid 19 coronavirus paper boat in water floating sinking by himmlisch pixabay

CIOs reshape IT priorities in wake of COVID-19

Surfacing from crisis mode, CIOs find themselves redefining IT priorities, thanks to budgets in flux, a rising need to refine business processes, and new outlooks on the future of work.

Layoffs  >  A stressed businessman carries away his personal belongings in a cardboard box.

The CISO's guide to securely handling layoffs

Follow these 10 best practices to limit risks to your organization.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

CIO | Middle East > Presentation / speaker / conference / workshop / training

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for leading IT from home

Leadership is being redefined in quarantine as IT executives find themselves overseeing IT operations from home. Here’s how to lead your department from a distance.

Conceptual image of a team reviewing data/alerts/solutions via a futuristic interface.

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

cso exectutive sessions 3000px x 3000px

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

ransomware attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600

The Internet of Things in 2020: More vital than ever

Just when we needed it most, the internet of things is delivering gobs of data and remote device control across almost every industry, from healthcare to agriculture.

tech spotlight iot cso thinkstock 510859324 2400x1600

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

8 getting breached is bad for business

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

orange monitors with lock icon network security cyber threat

32 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Load More