Features

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.
A conceptual representation of accessing username and password credentials.

digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

Failure frustration anger user man worker

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.

A hacker looks out over a city amid graphs of increasing trend lines and numerical rates.

Cybercrime in a recession: 10 things every CISO needs to know

Economic downturns force cybercriminals to change focus and creates conditions for new criminals to join their ranks. Here's how to prepare.

Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for running a successful virtual meeting

Running an online meeting can be as easy as running an in-person meeting if you follow a few simple steps. Here are five tips for taking your meetings online without missing a beat.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Passwordless authentication, Chromium-based Edge support

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 2004 feature release.

An unknown number calls a mobile phone amid pixelated data.

Vishing explained: How voice phishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

covid 19 coronavirus paper boat in water floating sinking by himmlisch pixabay

CIOs reshape IT priorities in wake of COVID-19

Surfacing from crisis mode, CIOs find themselves redefining IT priorities, thanks to budgets in flux, a rising need to refine business processes, and new outlooks on the future of work.

Layoffs  >  A stressed businessman carries away his personal belongings in a cardboard box.

The CISO's guide to securely handling layoffs

Follow these 10 best practices to limit risks to your organization.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

CIO | Middle East > Presentation / speaker / conference / workshop / training

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for leading IT from home

Leadership is being redefined in quarantine as IT executives find themselves overseeing IT operations from home. Here’s how to lead your department from a distance.

Conceptual image of a team reviewing data/alerts/solutions via a futuristic interface.

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

servers / server racks [close-up perspective shot]

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

cso exectutive sessions 3000px x 3000px

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

ransomware attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

Load More