Data Loss Prevention

Data Loss Prevention | News, how-tos, features, reviews, and videos

vulnerable cryptojacking hacking breach security
stealing a password

cloud security

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those...

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

risk assessment - safety analysis - security audit

Cyber risk management continues to grow more difficult

Primary reasons why cyber risk management is more difficult include increasing workloads, sophisticated threats, and more demanding business executives.

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections.

eye binary retina scanner security identity access management

Microsoft, Mastercard propose universal digital identity program

Microsoft and Mastercard say the “single, reusable digital identity” could solve identity verification issues and help with fraud prevention.

artificial intelligence brain machine learning digital transformation world networking

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface.

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

Black Hat 2015

The CSO guide to top security conferences, 2018-19

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

blue green abstract finger print identity bio security fingerprint

IAM for IoT: Taming the internet of threats

We don’t simply give users credentials and allow unfettered access to the network, why wouldn't we apply the same controls to a networked device?

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company.

cloud security ts

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private, and hybrid cloud deployments. Here’s advice on the tools, information, and organizational structure needed to execute a successful cloud security strategy.

8 encryption

Encryption is the best way to protect payment card transaction data

Criminals are going to steal payment card transaction data, but it won't matter if that data is devalued through encryption.

fbi badge gun

Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

An enormous ad fraud botnet, 3ve, was shut down after 1.7 million PCs were infected to falsify 12 billion ads per day.

firewall network security lock padlock cyber security

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs.

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

phishing hacker binary keyboard privacy security breach

Hacker adds malicious bitcoin-stealing code to popular JavaScript library

An NPM package with 2 million weekly downloads had malicious code injected into it. Plus, more problems arise from the Windows 10 October 2018 Update.

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Load More