Features

cybersecurity  >  information security / data protection / lock / shield
teamwork / collaboration / developers / development / engineers / binary code / virtual interface

A man looks through a magnifying lens at a group of figurines.

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship.

mobile security / threat detection / traffic analysis

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to.

youtube thumbnails template
video

CIO Leadership Live with Lety Nettles, SVP and CIO at Novant Health

Lety Nettles, SVP and CIO at Novant Health, joins Maryfran Johnson for this CIO Leadership Live interview. Watch as they discuss transforming healthcare IT, the digital patient experience, diversity in IT and more.

Lock with a question mark-shaped keyhole in a network of circuits + binary / digital transformation

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture.

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Demand for talent  >  Two business people compete for a third in a tug of war

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality.

Binary Russian flag

What is a false flag? How state-based hackers cover their tracks

False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice.

analyzing performance of wireless mobile connectivity data statistics

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro.

partnership / teamwork / handshake

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

exit sign expatriation cloud binary leaving the cloud

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

A businessman figurine carrying a suitcase stands on a map / travel / traveller / journey

Top 5 states for cybersecurity jobs

These states boast high average salaries and plenty of job opportunities, but that's not all that sets them apart.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

tt19 063 thumb
video

Top tech stories of 2019

The new Apple Card, the battle for cryptocurrency dominance, cybersecurity skills shortage – just a few of the stories that made headlines in 2019. Watch as IDG TECH(talk) hosts Ken Mingis and Juliet Beauchamp discuss the top tech...

secured vpn tunnel

What is WireGuard? Secure, simple VPN still in development

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise?

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like?

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

cioll 038 thumb
video

CIO Leadership Live with Michael Salas, SVP, CIO at SUEZ North America

Michael Salas, SVP, Chief Information & Digital Officer at SUEZ North America, joins Maryfran Johnson for this CIO Leadership Live interview. Watch as they discuss IT strategy, digital transformation and more.

Load More