Industry

Industry | News, how-tos, features, reviews, and videos

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms
Laura Deaner, CISO, Northwestern Mutual

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2021

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Fragmented image of a Boeing 787 airplane represented in encrypted data.

TSA to issue cybersecurity requirements for US rail, aviation sectors

New rules include reporting incidents to CISA and naming cybersecurity leads, but experts and industry representatives cite lack of input.

Identity access management  >  abstract network connections and circuits reflected in eye

One Identity acquires OneLogin in bid to offer consolidated IAM suite

In a move to offer its customers a consolidated suite of security applications, One Identity has acquired OneLogin, an IAM (identity and access management) provider, adding to its own set of PAM (privileged access management, IGA...

compliance compliant regulation rules stamp gdpr

Telos, Splunk, and StackArmor streamline ATO compliance on AWS

The FASTTR initiative from the three cloud and security companies aims to help regulated defense contractors and software providers navigate through complex government security regulations including FedRAMP, CMMC, FISMA, and...

healthcare data breach / medical patient privacy security violation

Breach reporting required for health apps and devices, FTC says

A new policy statement makes it clear that the US Federal Trade Commission will hold healthcare app and device makers accountable for reporting data breaches.

USA / United States of America stars + stripes and binary code superimposed over The White House

Software cybersecurity labels face practical, cost challenges

The federal government wants consumer software to have cybersecurity labels; experts question the feasibility of the mandate.

managed security service providers

How to find a security-savvy MSP

Not all managed service providers are strong on security. Here's how to weed out those that will put your small- to medium-sized business at risk.

A gavel rests on open law book. [law / regulation / compliance / legal liability]

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.

Global geopolitical cybersecurity vectors

9 notable government cybersecurity initiatives of 2021

Governments are increasingly taking on cybersecurity threats, as these nine government-led initiatives from around the globe show.

A laptop displays binary code and the flag of China.

China's PIPL privacy law imposes new data handling requirements

The Personal Information Protection Law will force global companies doing business in China to be more careful with cross-border flow of personal information.

many keys on a series of keychains / key rings / binary code overlay / password management

The 7 best password managers for business

Look to these top enterprise-class password manager to better secure employee account logins.

shutterstock editorial 12065997e jen easterly

CISA’s Joint Cyber Defense Collaborative: Why it just might work

New CISA director Jen Easterly is tasked with implementing the JCDC, which promises to make US critical infrastructure more resilient to cyberattacks. Her history makes her the right person for the job.

cso security global breach networking hack invasion infiltrate 5g connected gettyimages 1211443622

Data sovereignty laws place new burdens on CISOs

More than 100 countries now require data on their citizens be stored or processed within their boundaries, presenting new data protection challenges.

United States Capitol building / United States Congress / abstract security concept

GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

The US agency highlight four areas where cybersecurity gaps in federal agencies threaten national security. Cites OMB for not helping CIOs get available funds.

USA / United States of America stars + stripes and binary code superimposed over The White House

Biden memo, infrastructure deal deliver cybersecurity performance goals and money

The White House initiatives and expected passage of the US infrastructure plan will set new cybersecurity standards for critical infrastructure, provide money to state and local governments.

United States Capitol building / United States Congress / abstract security concept

18 new cybersecurity bills introduced as US congressional interest heats up

The new bills, many with bi-partisan support, aim to increase cybersecurity funding, improve breach reporting, investigate cryptocurrencies, and more.

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

The European Commission has set out new legislative proposals to make crypto transfers more traceable. While the plans will close some existing loopholes, the impact on cybercrime is likely to be minimal, experts say.

data pipeline primary

TSA issues second cybersecurity directive for pipeline companies

Experts applaud the agency's new, detailed security requirements for US pipeline operators but question how they will be enforced or monitored.

Load More
You Might Also Like