Features

phishing threat
COVID-19 coronavirus structures are layered amid statistical models.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Do you have a security tools gap?

Studies show that most CISOs think they have a security tools gap, but a deeper dive into the issue uncovers a much more complex dynamic.

handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.

risk assessment - safety analysis - security audit

EU's DORA regulation explained: New risk management requirements for financial firms

The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.

Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.

ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.

swatting thumb
video

What is swatting?

Swatting is a form of harassment in which attackers try to trick police forces into sending a heavily armed strike force — often a SWAT team, which gives the technique its name — to a victim's home or business. Learn more about...

vc3 beauchampkorolovthumb
video

How secure are your AI/ML projects?

Artificial intelligence and machine learning projects require a lot of complex data, which presents a unique cybersecurity risk. Security experts are not always included in the algorithm development process, resulting in effective but...

Mousetrap and cheese, seen floor-level from the perspective of the mouse.

4 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

adrian ludwig 1200x800px

Inside Atlassian's zero trust implementation

Adrian Ludwig says Atlassian's zero-trust implementation was nearly complete when the pandemic hit. His advice: Define policies to cover all cases first.

trojan horse malware virus binary by v graphix getty

From pranks to APTs: How remote access Trojans became a major security threat

A remote access Trojans (RAT) is malicious software that allows an attacker to gain unauthorized access to a victim’s computer over the internet. RATs are typically installed without user consent and remain hidden to avoid detection.

tools drill bits toolkit tookapic free cc0 via pexels binary thinkstock

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

locked data / bitcoins

How to buy Bitcoin for ransomware payment (if you must)

Avoid paying ransom demands if at all possible. When you have no choice, follow this advice for acquiring cryptocurrencies and executing the transaction.

micro segmentation security lock 2400x1600

How network segmentation mitigates unauthorized access risk

Two recent Microsoft vulnerabilities underscore the importance of segmenting your Windows network.

common negotiation errors2

5 best practices for negotiating SaaS contracts for risk and security

Software-as-a-service providers often handle your sensitive data. Here's how to hold them to a high standard for security.

blockchain cube abstract squares diversity colorful overlap filo getty

10 organizations that promote diversity in infosec

These groups are helping ensure that everyone has a seat at the table

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Biometric authentication, Edge browser

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 20H2 feature release.

Load More