Advertisement

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.


CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.


Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.


Advertisement

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.


CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.


DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...


cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.


Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....


Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.


Advertisement

budget piggy bank spending savings security spending
Cybersecurity Snippets

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.


Windows security and protection [Windows logo/locks]

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.


cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Episode 3: Succeeding with security as code

Podcast Episode 3: Listen now as Marnie Wilking, global head of security & technology risk management at Wayfair, talks about why the shift to the cloud requires a new set of security skills.


Anonymous hooded figure consisting of an abstract binary matrix, amid glitched code.

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it.


CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.