Features

partnership / teamwork / handshake
silver platter passwords exposed authentication hacked vulnerable security breach

Cybersecurity  >  A mysterious and intricate padlock with complex circuits

What is cybersecurity? Definition, frameworks, jobs, and salaries

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field.

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

CSO Hall of Fame 2020 [logo]

CSO Hall of Fame honorees

Meet the security leaders enshrined in the CSO Hall of Fame.

Job Interviewing Skills

Good tech talent is still hard to find (how to bridge the gap)

Companies have big plans for digital transformation, but the lack of skilled IT talent remains an obstacle. Here’s how to cope.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

tt19 058 thumb2
video

What's on our 2019 holiday wish list | TECH(talk)

Computerworld's Ken Mingis is joined by PCWorld's Michael Simon to discuss what they're wishing for this holiday season. From existing smart home gadgets and the Mac Pro to the yet-to-be-announced 5G iPhone, Ken and Michael hash out...

A silhouette composed of a series of clocks  >  time / transition / impermanence

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

laptop / networked binary data flows / world map

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release.

Cybersecurity  >  Internet security threats

Is your MSP an insider threat?

Managed services providers and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk.

man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.

cioll 035 thumb
video

CIO Leadership Live with Richard Wiedenbeck, CIO of Ameritas

Richard Wiedenbeck, CIO of Ameritas, and host Maryfran Johnson sit down to discuss fintech disruption, the Age of the Customer, enabling the digital business and more.

Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions.

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Load More