Technology Industry

Technology Industry | News, how-tos, features, reviews, and videos

3 security vendors
conference / convention / audience / applause / clapping

Handshake, mergers and acquisitions, M &A

Leading cybersecurity vendors join Mandiant's new Cyber Alliance Program

The alliance aims to develop integrated security systems and share threat intelligence, and lists partners including Google, Cloudflare, CrowdStrike, SentinelOne and Microsoft as founding members.

12 zero trust

How to stop worrying and love zero trust

If you want to work remotely from home — or stay on the move as a digital nomad — you can thank zero trust for making that possible.

csea lim shih hsien thumb
video

CSO Executive Sessions / ASEAN: Lim Shih Hsien on technology

Lim Shih Hsien – Head of Technology Masterplanning and Security, CISO, and CSO at Certis – joins Xiou Ann Lim for this CSO Executive Sessions interview. They will talk about new and old technologies from blockchain to passwords, and...

network security concept

SentinelOne to buy Attivo Networks for $617M, bringing ID-based security to XDR platform

Known as an endpoint protection vendor, SentinelOne is broadening its appeal by adding an identity-focused security layer to its Singularity XDR (extended detection and response) platform, in a $616.5 million deal.

shankar krishnan thumb
video

CSO Executive Sessions / ASEAN: Shankar Krishnan on leadership

Shankar Krishnan, CISO and Group Head of Information Security at Axiata Digital, joins Xiou Ann Lim for this CSO Executive Sessions interview. They will discuss how CISOs can use gamification to strengthen their company’s cyber risk...

Tim Fitzgerald, CISO and SVP, Arm

Arm’s vulnerability management program has legs

CISO Tim Fitzgerald’s vulnerability management program has delivered measured improvements and earned the security team recognition as a business-enablement function.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

data scientist face in profile with binary numbers analystics

Top 5 skills a SOC analyst needs

Whether building a new security operations center or revamping an existing one, staffing it with analysts that are equipped with these skills should be priority number one.

layered image of male executive holding thumbs up in CMYK

16 technology winners and losers, post-COVID

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.

hand holding paper cloud for amazon web services logo

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

The surprise announcement that Jeff Bezos will leave later this year and hand over the reins to AWS leader Andy Jassy marks a remarkable rise for Jassy. He began as a marketing manager in 1997 and started AWS in 2003.

data protection / security / risk management / data privacy / GDPR

Will India’s Data Protection Bill finally see the light of day in the 2021 Union Budget?

India’s Personal Data Protection Bill 2019, after being trudged through numerous parliamentary sessions, is once again expected to be presented in the upcoming Union Budget. And as before, it’s unlikely to be passed.

resume handshake cv career job search interview

10 ways to prep for (and ace) a security job interview

You've landed an interview for that security job you've had your eye on. Now prepare to land the job with these 10 techniques to get noticed and make an impression

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Load More
You Might Also Like