Features

A man and woman sit on opposite sides of an office desk, in discussion.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

ricardo lafosse Kraft Heinz

Kraft Heinz dishes up security transformation

For CISO Ricardo Lafosse, security modernization is the first order of business.

browser security

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.

binary cyberattack cybersecurity hacked protected

SSRF attacks explained and how to defend against them

Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. Defending against them can be relatively easy.

Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

8 top multifactor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft's very bad year for security: A timeline

Microsoft has had a horrible 2021, with vulnerabilities impacting its biggest services.

CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

tc constantin
video

Get up to speed on SASE: What's driving demand and how providers' capabilities differ

As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and...

ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.

Laura Deaner, CISO, Northwestern Mutual

Northwestern Mutual’s Laura Deaner: Resist the urge to solve stuff fast

Technologists want to “solve stuff really fast,” says Northwestern Mutual CISO Laura Deaner. But to cement their roles as business leaders, CISOs must take the time to understand the business and build a security strategy that solves...

network security / secure connections / integrated system of locks

Time to check software and security settings for Windows network vulnerabilities

October is Cybersecurity Awareness Month, and that's a good excuse to review what's running on your network to identify security risks.

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

data security / padlock / binary code / digital display

6 ways the pandemic has triggered long-term security changes

With some changes prompted by COVID-19 likely to be permanent, enterprises will need to revise their data security strategies.

virtual connections / social networking / remote teams

7 VPN alternatives for securing remote network access

Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2021

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

tc khawaja highmark
video

Highmark Health's journey to trust-centric security

With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association....

examining / analyzing / selecting / business data / statistics / analytics

Top cybersecurity statistics, trends, and facts

Survey data from the past year paints a picture for what your threat landscape will potentially look like in the coming months.

Load More