Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

conference / convention / audience / applause / clapping
Palo Alto Networks

shadow stock market business laptop virtual screen with financial chart quotes and graphs attacker

Economic pressures are increasing cybersecurity risks; a recession would amp them up more

Insider threats and the rate of successful attacks coupled with corporate cost-cutting efforts have historically hurt cybersecurity programs — and would likely do so again.

zuckerberg on stage

Meta hit with $413 million fine in EU for breaking GDPR rules

Regulatory wrangling results in a huge new fine over Facebook and Instagram data handling, even as Meta vows to appeal and EU data protection groups prepare for a court battle.

2022 robot future shutterstock 2084251795

The top 12 tech stories of 2022

The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security...

United States Capitol Building / Congress / legislation in a digital landscape

US Congress rolls back proposal to restrict use of Chinese chips

After business groups argued that proposed legislation to curb use of Chinese-made semiconductors would hurt national security, lawmakers amended it—but a final vote and the president's approval of the proposed National Defense...

3 security vendors

Build a mature approach for better cybersecurity vendor evaluation

Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.

Handshake, mergers and acquisitions, M &A

Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program

The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members.

12 zero trust

How to stop worrying and love zero trust

If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.

csea lim shih hsien thumb
video

CSO Executive Sessions / ASEAN: Lim Shih Hsien on technology

Lim Shih Hsien – Head of Technology Masterplanning and Security, CISO, and CSO at Certis – joins Xiou Ann Lim for this CSO Executive Sessions interview. They will talk about new and old technologies from blockchain to passwords, and...

network security concept

SentinelOne to buy Attivo Networks for $617M, bringing ID-based security to XDR platform

Known as an endpoint protection vendor, SentinelOne is broadening its appeal by adding an identity-focused security layer to its Singularity XDR (extended detection and response) platform, in a $616.5 million deal.

shankar krishnan thumb
video

CSO Executive Sessions / ASEAN: Shankar Krishnan on leadership

Shankar Krishnan, CISO and Group Head of Information Security at Axiata Digital, joins Xiou Ann Lim for this CSO Executive Sessions interview. They will discuss how CISOs can use gamification to strengthen their company’s cyber risk...

Tim Fitzgerald, CISO and SVP, Arm

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

data scientist face in profile with binary numbers analystics

Top 5 skills a SOC analyst needs

Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

You Might Also Like