Michael Nadeau

Senior Editor

Michael Nadeau is a senior editor with CSO Online. He has been a publisher and editor of magazines, books, and knowledgebases that help companies get the most from their ERP systems.

Hottest new cybersecurity products at RSA 2019

8 phishing emails and why you’ll fall for them (or not)

8 phishing emails and why you’ll fall for them (or not)

One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing.

13 data breach predictions for 2019

13 data breach predictions for 2019

How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions.

What is cryptojacking? How to prevent, detect, and recover from it

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

State of cybercrime 2018: Security spending up, but so are the risks

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training.

7 unexpected ways GDPR and other privacy regulations make security harder

7 unexpected ways GDPR and other privacy regulations make security harder

The GDPR and other privacy regulations are creating new opportunities for cyber criminals and roadblocks for security teams, while in some cases putting personal data at greater risk.

Identity eats security: How identity management is driving security

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

Security and new technology: How one company faced the unknown

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge.

Ready for more secure authentication? Try these password alternatives and enhancements

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

What is the New York Cybersecurity Regulation? What you need to do to comply

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan.

Data and privacy breach notification plans: What you need to know

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that.

Load More