Advertisement

Define your organization's culture

4 ways to build a strong security culture

Instead of blame and fear, security teams need to create a culture of personal responsibility to best protect data. Here's how two security leaders do it.


legos building blocks easy simple low code no code apps by iker urteaga unsplash

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.


rambleed ram memory card hardware hack breach binary by 13threephotography getty

OpenSSH to protect keys in memory against side-channel attacks

The new OpenSSH patch makes it harder to execute attacks such as Spectre, Meltdown, Rowhammer and Rambleed.


Advertisement

free online course education certification book hybrid laptop and book elearning by nosua getty

Free Course: Learn to install and Configure Splunk

In partnership with tech training provider PluralSight, CSO is offering free, limited-time access to the course “Installing and Configuring Splunk.”


pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.


trojan horse malware virus binary by v graphix getty

What is a Trojan horse? How this tricky malware works

A Trojan horse is a type of malware that can wreak havoc on computer networks — but only with your unwitting help.


speedometer / speed / fast / high performing / limits

A new website explains data breach risk

Breach Clarity ranks the risk of stolen or exposed personal data. It's a much needed work in progress.


windows 10 windows microsoft laptop keyboard update  by nirodesign getty

8 steps to make sure Microsoft Windows 10 1903 is ready for deployment

Follow these steps to identify problems that might crop up when you update to the Windows 10 1903 release.


questions to ask a vendor curious hand with question mark tablet ipad by stevanovicigor getty

6 questions to ask before buying an ICS / OT security monitoring tool

Shopping for an ICS / OT monitoring solution? Here's what you need to know about evaluating the vendors.


security internet network encryption privacy padlock
Cybersecurity Snippets

Cybersecurity pros' haphazard participation in data privacy raises concern

Limited training and unclear roles/responsibilities for cybersecurity teams restrict the effectiveness of data privacy programs.


Advertisement

CSO > Security automation

New MongoDB field-level encryption can help prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised.


shadowy figure reaching out from behind transparent wall
IDG Contributor Network

Forthright handling of cybercrime essential to improved results

While it is has become generally well-known that enterprises have a problem dealing with cybercrime, the true extent of the problem is much worse than many realize. In fact, even the entities that really ought to know the reality –...


mike assante cyber security guru by ryan g poirier

Mike Assante’s lasting impact on critical infrastructure security (and me)

Thanks to Mike Assante, critical infrastructure stakeholders have a better understanding of and ability to respond to cybersecurity risks.


mended relationship / handshake and bandaged heart

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it.


red light / warning / caution / alert / sign of threat or danger
IDG Contributor Network

Emerging security threats at the half-year mark

We’ve hit the halfway mark of 2019, and I’m sure that we have all noticed some interesting happenings in the cybersecurity world. I’d like to highlight a few that I’ve found interesting, but also disturbing – and I am sure that there...