Industry

Industry | News, how-tos, features, reviews, and videos

mobile security
United States Capitol building / United States Congress / abstract security concept

layered image of male executive holding thumbs up in CMYK

16 technology winners and losers, post-COVID

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

A hand activates the software update button in a virtual interface. [ update / patch / fix ]

The .NET patch failure that wasn’t

This month’s patch updates from Microsoft have caused few problems, and though there were some issues related to .NET, even those have been scattered.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

healthcare data breach / medical patient privacy security violation

The HITECH Act explained: Definition, compliance, and violations

The Health Information Technology for Economic and Clinical Health (HITECH) Act aims to expand the use of electronic health records through incentives to health care providers and consumers. It also tightens rules on providers to...

resume template job application recruit stack of paper by zhazhin sergey getty

Tech Resume Library: 24 downloadable templates for IT pros

A well-crafted resume will attract recruiters, HR pros and hiring managers, but getting it just right is a daunting task. To jump start the process, Insider Pro has assembled this collection of real resumes revamped by professional...

high priority gauge

The most important cybersecurity topics for business executives

Data privacy, current cyberthreats, and cybersecurity culture and training top the list, but are these the right priorities?

child coder boy with computer gaming children laptop

COPPA explained: How this law protects children's privacy

The Children's Online Privacy Protection Act is a U.S. law that aims to protect the privacy and personally identifying information of children under the age of 13 who use online services.

hand holding paper cloud for amazon web services logo

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.

A gavel rests on open law book. [law / regulation / compliance / legal liability]

CSO's ultimate guide to security and privacy laws, regulations, and compliance

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.

medical data accessed via tablet / healthcare IoT monitoring

HIPAA explained: definition, compliance, and violations

This landmark law imposes stringent privacy and security mandates on health care providers—and most of their IT vendors.

resume handshake cv career job search interview

10 ways to prep for (and ace) a security job interview

You've landed an interview for that security job you've had your eye on. Now prepare to land the job with these 10 techniques to get noticed and make an impression

United States Capitol building / United States Congress / abstract security concept

SolarWinds hack is quickly reshaping Congress’s cybersecurity agenda

More cybersecurity funding for states and Capitol, new breach reporting rules, and ransomware-related bills will likely be on the agenda for the 117th Congress.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

wan bank networking finance2

GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security

The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes...

compliance / regulations / rules / law / standards / policies

The Sarbanes-Oxley Act explained: Definition, purpose, and provisions

The Sarbanes-Oxley Act (sometimes referred to as SOA, Sarbox, or SOX) is a U.S. law passed in 2002 that aimed to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies.

CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key
Updated

Best new Windows 10 security features: Biometric authentication, Edge browser

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 20H2 feature release.

Load More