Features
video
Expanding fraud prevention and detection and cybersecurity at scale
Coast Capital Savings Director of Information Security Stephen Pedersen leads a team that focuses on cybersecurity along with fraud prevention and detection as it expands its business nationally through a digital banking platform....
Top cybersecurity M&A deals for 2021
The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.
Hacking 2FA: 5 basic attack methods explained
As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know.
What are phishing kits? Web components of phishing attacks explained
A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
17 cyber insurance application questions you'll need to answer
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.
How cybercriminals turn ‘harmless’ stolen or leaked data into dollars
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.
HITRUST explained: One framework to rule them all
HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
6 most common types of software supply chain attacks explained
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
CIO Think Tank Roadmap Report: Reinventing IT
As companies accelerate out of pandemic disruption, how can IT meet increasing demands — and reap unprecedented benefits? In a series of virtual roundtables, dozens of IT leaders offered key insights about the road ahead.
video
Aligning security, compliance and privacy across inventory tracking
Brad Wells, Executive Director, Information Security, and Kandice Samuelson, Senior Director, IT Governance at PPD lead a team enhancing PPD's inventory tracking system that identifies PPD’s most valuable assets. Join us to learn how...
Credential stuffing explained: How to prevent, detect, and defend against it
Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts.
5 best practices for conducting ethical and effective phishing tests
Phishing tests have become a popular feature of cybersecurity training programs, but they should follow ethical frameworks to ensure they don’t do more harm than good.
Tailor security training to developers to tackle software supply chain risks
Software developers need specialized security awareness training to help them spot supply chain risk and avoid being victimized by attackers.
The 10 most dangerous cyber threat actors
These are the most notorious global cybercriminal and state-sponsored groups according to security researchers.
How API attacks work, and how to identify and prevent them
Attackers know how to get around WAFs and API gateways when targeting APIs. Here's how some companies are coping with the rapid increase in API attacks.
video
The role of ransomware negotiators and what they can and can’t do
CSO senior writer Lucian Constantin knows that paying ransomware demands should be avoided -- unless lives are on the line or the survival of a business is at stake. Join us as Lucian talks about the role of the ransomware negotiator,...
The CSO role today: Responsibilities and requirements for the top security job
The CSO is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.
8 things CISOs should be thinking about, but probably aren't
CISOs need to cover all the security bases. The problem is, some of the bases are easy to overlook.
-
eBook
Sponsored -
eBook
Sponsored -
White Paper
-
eBook
Sponsored -
eBook
Sponsored
BrandPosts
Learn more-
Sponsored by Fortinet
-
Sponsored by Sophos
-
Sponsored by ExtraHop

![Digital Transformation [DX] > dandelion seeds blown by a virtual wind of change](https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-medium.3x2.jpg)
