Manufacturing Industry

Manufacturing Industry | News, how-tos, features, reviews, and videos

spy espionage weather balloon solar panels china shutterstock

combat ransomware

Report highlights serious cybersecurity issues with US defense contractors

The CyberSheath report found that US defense contractors are “woefully unprepared” and often don’t meet even the most basic security requirements that would keep military secrets safe.

Conceptual image of a network labeled 'Zero Trust.'

Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation

Protecting the most vital areas of the network first is a practical, doable defense, Brooks found when it implemented Illumio Core’s zero-trust segmentation platform.

cso execsessions thumbnail 1 copy
video

Trisha Liu-Ventura on women in cybersecurity

Trisha Liu-Ventura – Head of Cybersecurity, Governance, Risk, and Compliance at Coca-Cola Beverages Philippines – joins Xiou Ann Lim for this CSO Executive Sessions interview.

John Deskurakis, Chief Product Security Officer (CPSO), Carrier Global Corp.

How Carrier’s product security team delivers the ‘right support for the right product’

Carrier CPSO John Deskurakis developed a framework for product security that works for the lifecycle of all products across all business lines

mwc intel brian krzanich 5g drone stock image

Are Ukraine’s drone capabilities being throttled in Russia-Ukraine conflict?

Chinese drone producer DJI Global is accused of limiting capabilities of its AeroScope technology for the Ukrainian army, giving an air reconnaissance edge to Russian invaders.

Teresa Merklin, Fellow, Lockheed Martin Aeronautics

Lockheed’s Teresa Merklin: There’s no such thing as a quick fix

Forget the silver bullet; focus on cyber resiliency, advises the Lockheed Martin fellow.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The CSO identity management survival guide

This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.

You Might Also Like
BrandPosts
Learn more