Features

California Consumer Privacy Act  / CCPA  >  State flag / secured data

Bitcoin cryptocurrency falling.

Lack of trust will doom crytpocurrency

Loss of crypto coins through hacks, fake trading and volatility destroy trust in cryptocurrency, but those aren't its only problems.

A group of business leaders / board members with questions.

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone.

cso siem visibility gap in security apps legacy eyes crack breach privacy

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.

CSO  >  What is a computer virus?

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

youtube thumbnails template
video

CIO Leadership Live with Rob Galvin, CTO, The Port Authority of NY and NJ

Rob Galvin, CTO for The Port Authority of NY and NJ, and host Maryfran Johnson sit down to discuss digital passports, the impact of autonomous vehicles, IT/OT convergence and more.

best conferences to attend conference convention audience applause clapping by django getty

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Conceptual blockchain imagery.

What blockchain can and can't do for security

Blockchain expert Rosa Shores agrees: Unless you have a data integrity problem, blockchain won't fix it. Try a distributed ledger instead.

Multiple-exposure image of a businessman ascending a staircase within the profile of man in thought.

How CISOs become business leaders

Security leaders need to master marketing, HR, business lingo and more to really help lead their organizations, says William Hill’s group CISO.

Election secuity / ballot boxes / binary code

Secure elections scorecard: Grading the candidate and Congressional proposals

After 2016's election security debacle, there's a push to secure America's electronic voting infrastructure. Some of the proposals are good. Others fall short. CSO investigates.

succession brain sharing intellectual knowledge sharing

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

internet web browser

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you.

Closed markets in a dangerous neighborhood behind a police line caution tape barrier.

Dark web takedowns make good headlines, do little for security

Shutting down dark web marketplaces looks and feels good, but it hasn't significantly reduced risk. Worse, it drives cybercriminals to harder-to-track channels.

CSO  >  Adware  >  Browser windwows containing malicous code

What is adware? How it works and how to protect against it

Adware is deceptive software that earns its creators money through fraudulent user clicks. Fortunately, it's one of the the most detectable types of malware.

Network encryption / encrypted data transfers

Safely deploying TLS certificates: 5 common mistakes to avoid

A properly configured TLS cert is the first layer of defense for data in transit. Here are some tips to ensure a secure deployment.

youtube thumbnails template
video

CIO Leadership Live with Upinder Phanda, CIO of Unisys

Upinder Phanda, CIO at Unisys, and host Maryfran Johnson sit down to discuss IT strategy, leadership, workforce development and much more.

secure government messaging

What is the CISA? How the new federal agency protects critical infrastructure from cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) is a new federal agency, created to protect the nation's critical infrastructure.

A man looks through a magnifying lens at a group of figurines.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

CSO  >  Botnet  >  Robots amid a blue binary matrix

What is a botnet? When armies of infected IoT devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large...

Load More