CSO staff

How to tell if Pokemon Go is malware

How to tell if Pokemon Go is malware

Mobile security company Zimperium is putting out the alert to make sure users are cognizant of these apps when they head into app stores.

The problem with threat intelligence [Infographic]

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

Ransomware steals 8 years of data from Texas police department

Ransomware steals 8 years of data from Texas police department

Videos that were evidence to crimes are now lost. Attorneys are ready to pounce.

Face-off: Oracle vs. CA for identity management

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products.

4 historic security events of 2016 and what they teach us [Infographic]

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Top celebrity online security screwups in 2016

Top celebrity online security screwups in 2016

Password manager announces its inaugural "P@ssholes of the Year" list. The list highlights the high-profile people and organizations that experienced the biggest password-related blunders of 2016.

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

If you’re like most organizations, you think that you’ve got the right controls in place to deal with cyber attacks. But how prepared are you? The results of a recent survey might surprise you.

November 2016: The month in hacks and breaches

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers.

Who's responsible for data compliance? 25% of executives don't know

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

3 ingredients of a successful attack

3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive.

12 steps to lower your espionage risk

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

Why senior managers are the most dangerous negligent insiders

Why senior managers are the most dangerous negligent insiders

If you really want to move the needle on data security in your organization, start at the top.

SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

Research director Scott Tenaglia and lead research engineer Joe Tanen detailed the vulnerabilities during their talk at the Black Hat Europe conference in London last Friday. The zero-day flaws specifically relate to Belkin’s smart...

Do you know where your sensitive documents are?

Do you know where your sensitive documents are?

If your employees aren't even aware of what document management tools your organization uses — and that's true for 20% of them, according to a recent survey — you've got some serious policy enforcement issues.

17 tools to protect your online security

17 tools to protect your online security

Ready to get serious about online security? Start with password managers and two-factor authentication.

Crisis planning: 6 ways to put people first

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

Survey says men bothered more about retail breaches than women

Survey says men bothered more about retail breaches than women

Men are also more likely to switch to a competitor following a data breach than are women.

Investigating Cybersecurity Incidents — a free course

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

The speed of ransomware: 3 seconds to encryption [Infographic]

The speed of ransomware: 3 seconds to encryption [Infographic]

Once you've clicked the phishing email, it's too late.

The CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

Load More