Advertisement

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release.


life preserver disaster recovery windows recovery ocean rescue by paulfleet getty 2400x1600

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit.


data scientist woman at virtual monitor user interface tools for data science by metamorworks getty
Cybersecurity Snippets

A common user interface for security operations?

Why it's time to change how security analysts visualize, manipulate, interact with, and act upon security telemetry.


Advertisement

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

How a bank got hacked (a study in how not to secure your networks)

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern.


Cybersecurity  >  Internet security threats

Why you should consider your managed service provider an insider threat

MSPs and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk.


man typing on laptop search internet web browswer

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured.


holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.


Cybersecurity  >  Internet security threats

Bajaj Auto Finance bolsters security with threat-hunting SOC

A proactive approach to cybersecurity is helping Bajaj Finance, Auto Finance Division mitigate the risk spectrum of known, unknown, and unknown unknown threats.


Someone crouches, head in hands. / fear / stress / debilitation / weakness / exhaustion / fatigue

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions.


Advertisement

802.11ax Wi-Fi routers: Aerohive AP650, ASUS Rapture GT-AX11000 and D-Link AX6000

How to secure your router and home network

Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.


business travel / airport terminal walkway / traveller

What you need to know about new data-security rules for business travel

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.


digital fingerprint / binary code

Web payment card skimmers add anti-forensics capabilities

The newly discovered Pipka script can delete itself from a website after execution, making it very difficult to detect.


audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


API security alerts displayed on monitors amid binary code / application security

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.