Features

wireless mobile network - internet of things edge [IoT] - edge computing

6 essential elements of edge computing security

Edge computing is fast becoming a new cybersecurity “front line” as users overlook security in their rush to get data and services deployed. Do you have a plan for patrolling the edge?

runners at starting line

5 tips for getting started with DevSecOps

Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up.

credit card fraud

Analyzing user behavior to stop fake accounts

Online account fraud is a big, automated business. NuData Security looks at hundreds of data points to identify malicious login attempts.

3 blockchain

5 ways to hack blockchain in the enterprise

Experts warn of blockchain security risks in non-cryptocurrency use cases.

facial recognition - biometric security identification

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter.

thor web browser dark web binary onion

What is the Tor Browser? How it works and how it can help you protect your identity online

The Tor Browser is a web broswer that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

emerging tech ai machine learning

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge.

authentication

What is continuous user authentication? The best defense against fraud

Authenticating all user actions and attributes throughout a session ultimately provides the best defense against fraud and account abuse.

security trust

What it takes to build a zero trust network

Zero trust networks offer better protection against data breaches, but the road to them can be arduous.

fitbit versa fitness

5 things to know about fitness trackers and security in 2018

Activity trackers, including dedicated fitness trackers and smartwatches, can expose enterprise networks if not properly managed and connected.

network security woman code monitor

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead...

headphones espionage monitoring

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality.

risk assessment - safety analysis - security audit

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process.

futuristic user interface - smart city - digital transformation

For strong API security, you need a program not a piecemeal approach

When designed and managed properly, APIs can be less problematic than traditional integration methods and can actually increase an organization's security posture.

skull and crossbones in binary code

What is a zero-day exploit? A powerful but fragile weapon

A zero-day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Windows security and protection [Windows logo/locks]

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

pc antivirus

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

Load More