Advertisement
- Don't Miss:
- 2019 CSO100 Winners
Must Read
The biggest data breach fines, penalties and settlements so far
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.
Security Recruiter Directory
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Advertisement
Juspay data breach could have far-reaching consequences
Data from the breach, affecting millions of customers, is up for sale on the dark web.
Security Intelligence
5 things to look for in an XDR solution
The XDR market is hot, with vendors large and small jumping on the bandwagon. Here are 5 key capabilities to look for when evaluating XDR solutions.
17 types of Trojans and how to defend against them
Trojan malware comes in many different types, but all require a user action to initiate.
Hashing explained: Why it's your best bet to protect stored passwords
Hashing is a cryptographic process that makes it harder for attackers to decrypt stored passwords, if used correctly.
Top SolarWinds risk assessment resources for Microsoft 365 and Azure
Government and private organizations, including Microsoft, have released a wealth of information and tools to assess risk from SolarWinds-like attacks.
Lohrmann on GovSpace
3 security career lessons from 'Back to the Future'
You don't need to be able to predict the future to have a successful security career, but you had darned well better be able to learn from the past.
What IT leadership looks like in 2021
As IT leaders meet the challenges of the COVID era, only one thing is assured – more change is coming sooner than you think.
Advertisement
Top 7 security mistakes when migrating to cloud-based apps
As organizations rush key apps to the cloud to support remote workers, they often create opportunities for attackers. These are the most common mistakes to avoid.
The 15 biggest data breaches of the 21st century
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
4 ways attackers exploit hosted services: What admins need to know
Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.
33 hardware and firmware vulnerabilities: A guide to the threats
Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.
Checks and Balances
SolarWinds hack is a wakeup call for taking cybersecurity action
Many questions are yet to be answered as the investigation and response continues, but one thing is clear: managing supply chain risks requires a level of sophistication similar to that of the attackers.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by TaniumThe New Rules: IT Leaders Work to Regain Control of Their New Distributed