Features

Microsoft Office logo within an environment of abstract binary code with shield and lock.

Best resources for setting up Microsoft Office 365 security

Office 365 presents admins with many choices and options. These information sources, online forums and script repositories can help you make the right decisions.

wordpress

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out.

fingerprint scan biometric security system

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof.

automationlg

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units.

10 cloud security breach virtualization wireless

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data.

6 handling email phishing

8 phishing emails and why you’ll fall for them (or not)

One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing.

hack hacker hacked

The most interesting and important hacks of 2018

The hacks, exploits and data breaches security researcher need to most pay attention to are those that do something new or suddenly increase in volume.

ransomware

What is ransomware? How these attacks work and how to recover from them

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

Black Hat 2015

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

security command center monitors control center getty goro denkoff

12 top SIEM tools rated and compared

Security information and event management tools are a core part of most companies' cyber defenses. Use this guide to find SIEM options that best match your needs.

data breach predictions

13 data breach predictions for 2019

How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions.

hackathon contest computer competition hacking

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.

online dating scams hacker

How to end a romance scam

Use this two-part test to convince romance scam victims that their “true love” is a fraud.

vulnerable cryptojacking hacking breach security

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

recruiting thinkstock

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

google pixel slate keyboard with hands2

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks.

bridgestone data center 1968

8 old technologies that still play roles in security

Newer isn't always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.

pc antivirus

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

Gate Smart Lock

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company.

Load More