CSO staff

Security startups to watch for 2022

New US CISO appointments, August 2022

New US CISO appointments, August 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.

The CSO guide to top security conferences, 2022

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Top cybersecurity M&A deals for 2022

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

5 best practices for secure collaboration

5 best practices for secure collaboration

How successful companies are facing the challenges of securing emerging communication technologies.

Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

How to conduct a tabletop exercise

How to conduct a tabletop exercise

Testing your security policies and procedures in real-life scenarios can help you improve your security posture—if you implement the lessons learned.

How Aflac maximizes security ROI

How Aflac maximizes security ROI

Return on security investment is more than a matter of dollars and sense, it’s also about ensuring the security technologies you’re employing stand up to today’s threats.

Chris Wysopal: Open source is becoming a national security risk

Chris Wysopal: Open source is becoming a national security risk

The Veracode CTO explains what set the Log4j vulnerabilities apart, how it raised awareness of issues around open source security, and where he sees progress.

Security and privacy laws, regulations, and compliance: The complete guide

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.

How JetBlue creates a culture of security

How JetBlue creates a culture of security

VP of Security Keith Slotter and his team have tapped 600 employees across the organization as part of a Security Champions program. The result is a strengthened security presence and an employee population engaged in security.

Top cybersecurity M&A deals for 2021

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

18 cybersecurity startups to watch

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...

The worst and most notable ransomware: A quick guide for security pros

The worst and most notable ransomware: A quick guide for security pros

The ransomware gangs and their malware listed here have victimized millions of companies and caused billions of dollars in costs.

Survey: Aussie, NZ businesses now realise their security overconfidence

Survey: Aussie, NZ businesses now realise their security overconfidence

The twin pressures of the COVID-19 pandemic and a spike in cyberattacks forced organisations to increase their security efforts in 2020.

NSW to launch new cyber vulnerability response centre

NSW to launch new cyber vulnerability response centre

Bathhurst facility to open in July, part of $240 million state effort.

Australia suffers ‘sophisticated’ cyber attack; PM urges better cyber security

Australia suffers ‘sophisticated’ cyber attack; PM urges better cyber security

The prime minister declines to state which country is behind the attacks, while promising action on a stalled cyber security effort.

Summer 2020: CISO rising

Summer 2020: CISO rising

Breach concerns, data privacy regulations and new responsibilities for managing risk are elevating the security leadership role.

Data breached in translation

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

Take part in the 2019 CSO UK reader survey

Take part in the 2019 CSO UK reader survey

We want to know what you think of us, and are giving away Amazon vouchers and a smartphone to sweeten the deal

Load More