Features

FinTech / electronic payments / banking / dollars / euros / pounds / yen
A hook is cast at laptop email with fishing lures amid abstract data.

Gourav Mukherjee, managing partner, Immersion Security

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.

Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.

secured vpn tunnel

What is WireGuard? Secure, simple VPN now part of Linux

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography, and now it's built into Linux 5.6. Is it ready for the enterprise?

youtube thumbnails template 021020
video

What is a deepfake? How to prepare for and respond to this cyber attack

As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern...

radar grid overlays the pupil of an eye / intrusion detection / scanning / threat assessment

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market.

Slack logo / security / network

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

special report downturn economic by anueing gettyimages 606665834 3x2 2400x1600

Dealing with the downturn

As the coronavirus pandemic builds, businesses are already reeling from the economic impact. Here's how IT can adjust to a new reality of cost trimming and budget cuts.

A vast network of identity avatars. [identity management]

10 identity management metrics that matter

Monitoring these key identity and access management numbers will help you evaluate the performance of your IAM solution.

Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

A Microsoft update gets ready on a screen also displaying a COVID-19 coronavirus visualization.

Securing Windows and Office in a time of COVID-19: update policies, remote options

Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.

A woman and a man have a conversation while holding a notebook and pen, coffee and a mobile tablet.

How CISOs and data privacy officers should work together

Close collaboration between CISOs and DPOs can benefit both roles in their efforts to better understand, align with and protect the business.

CIO | Middle East > Presentation / speaker / conference / workshop / training

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

A businesswoman wears a protective mask in an office.  >  protection from viruses/pollutants/toxins

4 steps to build redundancy into your security team

A biological virus infecting your critical security staff could wreak havoc on your business. These practices will reduce your risk.

Zero-trust / COVID-19 / pandemic

COVID-19 offers a unique opportunity to pilot zero trust, rapidly and at scale

A zero-trust model addresses many of the security concerns around supporting large numbers of remote workers, and new vendor free trials make fast deployment possible.

network security concept

COVID-19 and tech: New collaboration tools mean new security risks

As the coronavirus forces companies to move their communication and file sharing onto collaboration platforms, be prepared for unintended consequences: New security threats will surface, requiring new methods of securing your...

coronavirus remote worker work from home romolotavani getty

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Load More