Technology Industry
Technology Industry | News, how-tos, features, reviews, and videos
Economic pressures are increasing cybersecurity risks; a recession would amp them up more
Insider threats and the rate of successful attacks coupled with corporate cost-cutting efforts have historically hurt cybersecurity programs — and would likely do so again.
Meta hit with $413 million fine in EU for breaking GDPR rules
Regulatory wrangling results in a huge new fine over Facebook and Instagram data handling, even as Meta vows to appeal and EU data protection groups prepare for a court battle.
The top 12 tech stories of 2022
The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security...
US Congress rolls back proposal to restrict use of Chinese chips
After business groups argued that proposed legislation to curb use of Chinese-made semiconductors would hurt national security, lawmakers amended it—but a final vote and the president's approval of the proposed National Defense...
Build a mature approach for better cybersecurity vendor evaluation
Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.
Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program
The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members.
How to stop worrying and love zero trust
If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.
video
CSO Executive Sessions / ASEAN: Lim Shih Hsien on technology
Lim Shih Hsien – Head of Technology Masterplanning and Security, CISO, and CSO at Certis – joins Xiou Ann Lim for this CSO Executive Sessions interview. They will talk about new and old technologies from blockchain to passwords, and...
SentinelOne to buy Attivo Networks for $617M, bringing ID-based security to XDR platform
Known as an endpoint protection vendor, SentinelOne is broadening its appeal by adding an identity-focused security layer to its Singularity XDR (extended detection and response) platform, in a $616.5 million deal.
video
CSO Executive Sessions / ASEAN: Shankar Krishnan on leadership
Shankar Krishnan, CISO and Group Head of Information Security at Axiata Digital, joins Xiou Ann Lim for this CSO Executive Sessions interview. They will discuss how CISOs can use gamification to strengthen their company’s cyber risk...
Arm’s vulnerability management program has legs
CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.
What is the dark web? How to access it and what you'll find
The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.
Top 5 skills a SOC analyst needs
Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
Tech Primer
Red team versus blue team: How to run an effective simulation
Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.
Tech Primer
How to survive (and thrive) in the CISO hot seat
The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.