Features

4 encryption keys
Black Hat 2015

Windows security and protection [Windows logo/locks]

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

pc antivirus

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

sort filter folders organizing

Why you need centralized logging and event log management

Collecting too much log data overwhelms systems and staff. Centralized event log management lets you filter for the most significant security data.

boardroom job opening executive in silhouette empty chair new job

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan.

sequence 01.00 10 55 13.still001
video

CIO Leadership Live with James Rinaldi, CIO, Director for Information Technology, NASA’s Jet Propulsion Laboratory | Ep 11

In this episode, host Maryfran Johnson talks with James Rinaldi, CIO at NASA's Jet Propulsion Lab, about opening up data silos and driving data transformation; having a seat at the table to lead change; and using technology to explore...

iot security ts

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

user authentication

How to evaluate web authentication methods

Authentication evaluation white paper includes popular and obscure methods and outlines a framework for assessing their security effectiveness.

cloud apps

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

medical heart rate monitor ekg hospital

5 tips to thwart medical device attacks

Medical devices can be an easy gateway for hackers to steal valuable information. This advice will lower the risk of that happening.

facebook hallway london headquarters reuters toby melville rtx3l5uy

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection...

ransomware

What does a ransomware attack cost? Beware the hidden expenses

The ransom is only a tiny portion of the total cost of a ransomware attack. Consider these associated costs when estimating the total damage.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

mobile connection endpoint protection

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier.

Load More