CSO staff

New US CISO appointments, August 2022

The CSO guide to top security conferences, 2022

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Top cybersecurity M&A deals for 2022

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

5 best practices for secure collaboration

5 best practices for secure collaboration

How successful companies are facing the challenges of securing emerging communication technologies.

Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Security startups to watch for 2022

Security startups to watch for 2022

Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.

How to conduct a tabletop exercise

How to conduct a tabletop exercise

Testing your security policies and procedures in real-life scenarios can help you improve your security posture—if you implement the lessons learned.

How Aflac maximizes security ROI

How Aflac maximizes security ROI

Return on security investment is more than a matter of dollars and sense, it’s also about ensuring the security technologies you’re employing stand up to today’s threats.

Chris Wysopal: Open source is becoming a national security risk

Chris Wysopal: Open source is becoming a national security risk

The Veracode CTO explains what set the Log4j vulnerabilities apart, how it raised awareness of issues around open source security, and where he sees progress.

Security and privacy laws, regulations, and compliance: The complete guide

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.

How JetBlue creates a culture of security

How JetBlue creates a culture of security

VP of Security Keith Slotter and his team have tapped 600 employees across the organization as part of a Security Champions program. The result is a strengthened security presence and an employee population engaged in security.

Top cybersecurity M&A deals for 2021

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

Load More