Features

android trojan banking hack virus bank breach by etienne martin unsplash and google android

Alien malware a rising threat to mobile banking users

The Alien malware has quickly become a popular choice for cybercriminals to commit bank fraud. Here's why.

A recking ball with exclamation point smashes into U.S. hundred-dollar bills.

7 overlooked cybersecurity costs that could bust your budget

Is your cybersecurity budget covering all the bases? Here's a look at seven expenses that budget planners often minimize or fail to address.

The open jaws of a spring trap lie in wait. [danger / risk]

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

CSO  >  Botnet  >  Robots amid a blue binary matrix

InterPlanetary Storm cross-platform P2P botnet infects computers and IoT devices

IPStorm's ability to infect Android, macOS and Windows devices as well as those that are Linux-based makes it much more dangerous.

A businesswoman looks into the distance amid abstract technology, colleagues in background.

What it takes to be a transformational CISO

The skills and traits of effective change leaders.

forensics threat hunter cyber security thumbprint

Tips to prep for digital forensics on Windows networks

Know what data you need to collect and how you will collect it before a security incident occurs on your Windows network.

Unlocked circuit board / security threat

6 top vulnerability management tools and how they help prioritize threats

Organizations handle vulnerability management in various ways, from training and best-practice implementations to filtering out all but the most dangerous threats. Here's a look at some of today's more innovative solutions.

A magnifying lens examines top secret information amid binary code.

Confidential Computing: What is it and why do you need it?

Confidential Computing can significantly enhance enterprise security, but what is it, and what do you need to do about it?

Impersonation / disguise / fraud / false identity / identity theft

Identity theft explained: Why businesses make tempting targets

Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.

Encryption  >  Encrypted data / hexadecimal code

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

9 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

locked data / bitcoins

WastedLocker explained: How this targeted ransomware extorts millions from victims

WastedLocker is sophisticated ransomware created by Evil Corp, a notorious cyber criminal group.

A man with his head in his hands amid abstract security contruct.

Stretched and stressed: Best practices for protecting security workers' mental health

Security work is stressful under the best of circumstances, but remote work presents its own challenges. Here's how savvy security leaders can best support their teams today — wherever they're working.

handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Double-exposure shot of a businesswoman using a mobile phone, binary code and statistical graphs..

Skills and traits of a business-savvy CISO

CISOs looking to advance their careers or land a plum job must prove they are really on top of their game. Here's what recruiters say sets business-savvy CISOs apart.

green mesh rope network connections

Mesh VPNs explained: Another step toward zero-trust networking

Mesh VPNs use a peer-to-peer architecture where every node or peer in the network can connect directly to any other peer without going through a central concentrator or gateway. This approach can be less expensive and easier to scale...

microsoft 365 channel attributes apps

New Microsoft 365 defaults, Application Guard beta add email protections

Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.

man typing on laptop search internet web browswer

8 top open source intelligence tools

OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

IDG Tech Spotlight  >  Edge Computing [ Network World (intro) / September 2020 ]

Edge computing: The next generation of innovation

The future of enterprise tech won't be confined to the data center mothership -- nor even the public cloud. Wedded to the internet of things, edge computing puts processing horsepower wherever it needs to go.

Load More