Advertisement

CSO  >  danger / security threat / malware / biohazard symbol in data center / servers

Attack campaign hits thousands of MS-SQL servers for two years

Newly discovered Vollgar attack uses brute force to infect vulnerable Microsoft SQL servers at a high rate.


security risk - phishing / malware / social engineering

How to prepare Microsoft Office and Windows for ransomware and email attacks

You've set up your remote workers during this COVID-19 crisis, but have you made the adjustments to be prepared for a cyber disaster like a ransomware attack?


Exiting the computing business

5 reasons security staff leave (and what to do about it)

Retaining skilled security staff is difficult in the best of times, but there are steps you can take that will make a difference.


Advertisement

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.


security school education binary code classroom by skynesher getty

Security School: Enroll today and advance your tech career

Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.


Slack logo / security / network

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.


special report downturn economic by anueing gettyimages 606665834 3x2 2400x1600

Dealing with the downturn

As the coronavirus pandemic builds, businesses are already reeling from the economic impact. Here's how IT can adjust to a new reality of cost trimming and budget cuts.


COVID-19 coronavirus [morphology/visualization]
Cybersecurity Snippets

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020.


CSO  >  ransomware / security threat

As Australian ransomware toll grows, so do home-working risks

Organisations that delayed patching are especially susceptible to risks from home-based workers


security threats and vulnerabilities

How to protect remote workers from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.


Advertisement

A vast network of identity avatars. [identity management]

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.


Malicious USB dongle / memory stick / thumb drive with skull icon

Cybercriminal group mails malicious USB dongles to targeted companies

Shown as a proof-of-concept in 2014, this is the first known use of the BadUSB exploit in the wild.


5G light trails
Checks and Balances

5G without governance is risky business

5G implementations that fail to include baking in the needed governance safeguards will be subject to cost overages, inefficiencies and erosion of customer trust. Can your business afford that risk?


young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

How remote access tools can help your businesses adapt to the coronavirus

Coronavirus has created unprecedented challenges for companies and their employees across the globe and remote access tools are helping them meet them.


Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.