Features

Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

healthcare data breach / medical patient privacy security violation

5 biggest healthcare security threats for 2021

Healthcare organizations can expect ransomware, botnets, cloud misconfigurations, web application attacks, and phishing to be their top risks.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Improvements to Intune, Windows Defender Application Guard

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 21H1 feature release.

cryptojacking thumb
video

What is cryptojacking? Why criminals love this con

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer or by...

Tech Spotlight   >   Cloud [IFW / Overview]   >   Clouds reflected in a towering modern skyscraper.

The great cloud computing surge

Driven in part by the pandemic, cloud computing adoption has reached new heights. These five articles take a close look at the implications.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

AWS, Google Cloud, and Azure: How their security features compare

Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2021

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

vcmar prunera omar
video

Establishing security ambassadors to fortify a secure organizational culture

ADP’s Senior Director, ESI Business Security Office and Global Programs Omar Prunera leads the development of ADP’s Security Ambassadors for Excellence (S.A.F.E.) program to inform and train employees about security, improve their...

Ransomware  >  A masked criminal ransoms data for payment.

CSO's guide to the worst and most notable ransomware

The ransomware gangs and their malware listed here have victimized millions of companies and caused billions of dollars in costs.

keeping the cloud secure cloud security lock padlock private cloud

The shared responsibility model explained and what it means for cloud security

The shared responsibility model (SRM) delineates what you, the cloud customer is responsible for, and what your cloud service provider is responsible for.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

6 minimum security practices to implement before working on best practices

Every Windows network admin can improve their security posture by focusing on these six basic areas.

7 response plan be prepared are you ready typewriter

10 things to do now to reduce the cost of your next data breach

Taking these steps will save money, time, and reputation when that next breach hits.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

CSPM explained: Filling the gaps in cloud security

Cloud security posture management (CSPM) provides threat intelligence, detection, and remediation for complex cloud environments.

USA / United States of America stars + stripes and binary code superimposed over The White House

Ransomware response: What CISOs really want from the federal government

What should the federal government's role and responsibility be regarding ransomware? Security leaders weigh in.

Money flows through a tunnel of binary code as a target hovers over a code bug.

5 questions to answer before jumping on the bug bounty bandwagon

Bug bounty programs can bolster your vulnerability management capabilities, but are you ready?

A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Digital Transformation [DX]  >  dandelion seeds blown by a virtual wind of change

The SolarWinds hack timeline: Who knew what, and when?

Impact, detection, response, and ongoing fallout from the attack on SolarWinds' Orion remote IT management software.

vcmar pedersen steve copy
video

Expanding fraud prevention and detection and cybersecurity at scale

Coast Capital Savings Director of Information Security Stephen Pedersen leads a team that focuses on cybersecurity along with fraud prevention and detection as it expands its business nationally through a digital banking platform....

Multifactor authentication  >  Mobile phone verification of a permission request for laptop login.

Hacking 2FA: 5 basic attack methods explained

As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know.

Load More