CSO staff

Free course: Windows virus and malware troubleshooting

Free course: Windows virus and malware troubleshooting

Learn how to identify, block and remove malware from Windows PCs.

Mobile security for the road warrior

Mobile security for the road warrior

Follow these easy, inexpensive tips for keeping your smartphones and computers safe while traveling.

11 tips to prevent phishing

11 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

IDG Security Day features events in 9 countries

IDG Security Day features events in 9 countries

On June 21, IDG Enterprise will follow the sun and discuss the challenges organizations across the globe face when attempting to identify or mitigate risk. To do this, IDG has organized Security Day, a global event that is coming to...

GDPR requirements raise the global data protection stakes

GDPR requirements raise the global data protection stakes

New European Union data protection rules go into effect in 2018. Will you be ready?

Stopping ransomware starts with the security pros

Stopping ransomware starts with the security pros

Bromium survey of security professionals shows lapses in their own best practices.

April 2017: The month in hacks and breaches

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April.

Three shades of hackers: The differences among the white, grey, and black hats

Three shades of hackers: The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

Report: Bad policies and practices put data at risk [Infographic]

Report: Bad policies and practices put data at risk [Infographic]

The 2017 Varonis Data Risk Report shows the scope of the risk associated with corporate data files.

"Hack the Pentagon" creator joins GRIMM as principal for security consulting

Lisa Wiswell brings a strong background in security and defense, as well as credibility with the hacker community.

12 ways to defend the network inside and out

12 ways to defend the network inside and out

Wikileaks is consistently sharing information with the public that was intended to remain confidential, if not top secret, by organizations thought to have the toughest security in place. Add in the numerous other breaches reported in...

March 2017: The month in hacks and breaches

March 2017: The month in hacks and breaches

Voter records, patient data, and CIO hacking tools were among the data stolen last month.

Bot attacking gift card accounts

Bot attacking gift card accounts

Distil Networks has found a bot affecting nearly 1,000 customer websites. Gift cards are under attack by hackers, and consumers are being advised to check their balances.

February 2017: The month in hacks and breaches

February 2017: The month in hacks and breaches

An unsecured MongoDB database, sluggishness about disclosing and patching vulnerabilities, and “I was just curious” were among the contributing factors to the month’s incidents.

The high price of security shaming [Infographic]

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

Secrets of successful CISOs [Infographic]

Secrets of successful CISOs [Infographic]

Who the CISO reports to matters more than you might think, but it isn’t the only secret to success.

Study: 1 in 3 website visitors is an attack bot

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

January 2017: The month in hacks and breaches

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

Hacking the 2016 election: A timeline

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

How to tell if Pokemon Go is malware

How to tell if Pokemon Go is malware

Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores.

Load More