Advertisement

istock 1157378123 blog 4
Securing What’s Now and What’s Next

Zero Trust Part 1: Demystifying the Concept

Despite the fact that Zero Trust has been around for a decade, there are still plenty of misconceptions about it in the marketplace.


CSO Executive Sessions [podcast logo]
CSO Executive Sessions

Episode 7: Security in a time of crisis

Podcast Episode 7: Listen now as Christopher Burgess, a writer and speaker on security issues and former senior security adviser to Cisco, discusses the risk from the scramble to move to remote work at scale.


Security administration  >  A shield protects a network of users and systems.

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing.


Advertisement

A military meeting with civilians.

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base, which includes over 300,000 companies in the supply chain.


CSO  >  Botnet

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

The sophisticated botnet also has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks.


how to prioritize application security flaws
The State of Software Security: A 360-Degree Look

How to Prioritize Application Security Flaws

Volume 10 of the Veracode “State of Software Security” report makes one fact abundantly clear: there’s no shortage of security flaws to be fixed in the applications we use every day. So many, in fact, that it’s virtually...


FinTech / electronic payments / banking / dollars / euros / pounds / yen

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments.


A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.


5G mobile wireless network technology / connections

White House strategy paper to secure 5G envisions America leading global 5G development

Though light on details, the paper offers clues as to how the US government sees the development and security of 5G communications moving forward.


Gourav Mukherjee, managing partner, Immersion Security

How one healthcare CISO is navigating the COVID-19 crisis

Security is in an “all hands on deck” situation at the healthcare organization as it pivots to a mostly remote working organization.


Advertisement

COVID-19 coronavirus / network of vectors

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety.


Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.


Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

How to protect yourself from coronavirus phishing threats

The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and COVID-19 phishing attacks and five ways to avoid them.


soss top 5 takeaways
The State of Software Security: A 360-Degree Look

State of Software Security: Top 5 Takeaways for Security Professionals

There’s a lot to unpack in our most recent State of Software Security (SOSS) report, including some then vs. now comparisons, a look at the most popular vulnerabilities, and a deep dive into security debt. Here are the five...


Money flows through a tunnel of binary code as a target hovers over a code bug.

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms.