Features

CSO > breakthrough / penetration testing / hammer breaking binary glass
Ransomware

RSA 2020's hot new startups

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth.

Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.

CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.

Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

cioll20 002 thumb
video

CIO Leadership Live with Mike Santimaw, SVP and CIO at Rent-A-Center

Mike Santimaw, SVP and CIO at Rent-A-Center, joins Maryfran Johnson for this CIO Leadership Live interview. Watch as they discuss simplifying IT architecture, personalizing the customer experience and more.

tt20 014 thumb
video

Technology we love

In honor of Valentine’s Day, we’re talking about technology we love. AI, 5G, edge computing, collaboration tools – all have people’s hearts racing. Watch as Michael Simon, writer for Macworld and PCWorld, and IDG TECH(talk) hosts Ken...

CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

tt20 011 thumb
video

What's the difference between the deep web and the dark web?

We hear the terms "deep web" and "dark web" thrown around a lot... but what do they actually mean? And what's the difference between the two? CSO Online writer J.M. Porup joins Juliet to dispel rumors and discuss what sets the deep...

IDG Tech Spotlight  >  Security  >  Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation.

cia triad security triangle glowing binary process by nolimit46 getty 2400x1600

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure.

IDG Tech Spotlight  >  Security  >  Why ransomware might be your biggest threat [CSO]

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes.

man typing on laptop search internet web browswer

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed.

Antivirus digital syringe and virus/biohazard symbol in binary matrix

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Load More