Advertisement

A group of business leaders / board members with questions.

13 traits of a security-conscious board of directors

A CISO's success (and job longevity) is often dependent on support from the board of directors. Answers to these questions will reveal how security savvy a BoD is.


iot security startups hot highlights planets rocket lock security

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...


A person leaps between platforms surrounded by sharks. [danger / risk / challenges]

Enhancing zero trust access through a context-aware security posture

Cybercriminals prefer to attack organizations at sensitive times such as during a merger or earnings release. Adjusting zero-trust policies during those times will help mitigate that risk.


Advertisement

dark web negotiating making a deal communication argue debate hiding solarseven getty

9 tips for an effective ransomware negotiation

If you have no choice but to pay attackers to get critical data back, these best practices could put you in the best possible position to recover from a ransomware attack.


CSO  >  malware / virus / security threat / protective antivirus shield

How to prevent sideloading attacks in Windows and Office 365

A few settings in Windows or Office 365 can help stop users from installing malicious apps on their devices.


Storage

Study: Storage systems are weakest link in IT infrastructure security

Continuity Software analyzed systems from businesses in multiple industry sectors in the US, Europe, and Middle East, finding that storage system security lags behind compute and network security.


eliminate insider threats 1

What CISOs can learn from the US Navy insider who stole nuclear secrets

The theft of government secrets by Jonathan Toebbe and others raises the question: How should CISOs deal with insider threats who have had insider threat training?


email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.


A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]

Void Balaur explained—a stealthy cyber mercenary group that spies on thousands

Unlike other groups, Void Balaur will target individuals and organizations in Russian-speaking countries and seems to have intimate knowledge of telecom systems.


red padlock cybersecurity threat ransomeware

The Kaseya ransomware attack: A timeline

REvil's ransomware attack on software provider Kaseya underscored the threats to supply chains that ransomware groups pose. Here is an up-to-date timeline of the attack.


Advertisement

A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


security detection monitoring
Cybersecurity Snippets

Will XDR modernize the SOC?

Organizations are both adopting XDR technology and modernizing the SOC. New ESG research points to areas of potential overlap and even conflict between those two initiatives.


avoid detour side step trap hole in floor arrow by lucadp getty images

How CISOs escape the cost center trap

Even as the CISO role is becoming more business-focused, in many organizations the notion of security as purely a cost center persists. Here’s how savvy CISOs can turn that around.


Toy soldiers + binary code / wargames / cyberwarfare

Cyberwar’s global players—it’s not always Russia or China

Research reveals that countries such as Belarus, India, and Colombia are responsible for significant cyberattacks.


man with smooshed face frustrated overwhelmed stressed shocked by ryan mcguire gratisography

Competing security priorities are challenging ‘frazzled’ Australian CISOs

Cybersecurity literacy, not technology, is the biggest headache for security leaders.