Advertisement

Data viewed secretively with binoculars.

What data China collected about 35,000 Aussies—and 2.4 million people globally

Zhenhua Data defends “research”—but concerns mount over what Australia has discovered about Chinese gathering of personal data.


executive pushing boulder uphill deadline stress struggle
Cybersecurity Snippets

5 persistent challenges security pros face

Highlights from the fourth annual “Life and Times of Cybersecurity Professionals” report


handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


Advertisement

access management / access control / user connections / identities

7 best practices when selecting a PAM solution

The right PAM solution will enable security and compliance teams to define and enforce robust privileged account policies. So how do you pick the right PAM solution?


Double-exposure shot of a businesswoman using a mobile phone, binary code and statistical graphs..

Skills and traits of a business-savvy CISO

CISOs looking to advance their careers or land a plum job must prove they are really on top of their game. Here's what recruiters say sets business-savvy CISOs apart.


green mesh rope network connections

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale...


microsoft 365 channel attributes apps

New Microsoft 365 defaults, Application Guard beta add email protections

Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.


whitelisting computer security security oversight admin lockout control by metamorworks getty images

Telstra taps Australian cyber cops to block SMS spoofing attacks

As COVID-19’s digital-services surge drives increased fraud, Defence Ministry helps government services agency identify legitimate communications.


man typing on laptop search internet web browswer

8 top open source intelligence tools

OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.


IDG Tech Spotlight  >  Edge Computing [ Network World (intro) / September 2020 ]

Edge computing: The next generation of innovation

The future of enterprise tech won't be confined to the data center mothership -- nor even the public cloud. Wedded to the internet of things, edge computing puts processing horsepower wherever it needs to go.


Advertisement

A hacker attacks from within a Windows system.

Windows code-signing attacks explained (and how to defend against them)

Learn how code-signing attacks work and how to defend against them. It starts with patching.


IDG Tech Spotlight  >  Edge Computing [ CSO / September 2020 ]

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.


CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.


CSO: Have you met these hackers? [slide 01]

11 types of hackers and how they will harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.


CSO  >  An exclamation-mark alert in a field of abstract technology.

10 common cloud security mistakes that put your data at risk

Yes, the cloud offers many security advantages over on-premises, especially for smaller organizations, but only if you avoid these mistakes around cloud configuration, monitoring and patching.