Advertisement

A woman carefully studying survey data.

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices.


A businessman interacts with a Microsoft-colored shield protecting network users + user groups.

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them.


Abstract blockchain concept  >  Blocks / nodes / connections / transactions

4 blockchain security lessons from Euroclear's CISO

Euroclear is taking a security in-depth approach with its blockchain project. CISO Vincent Laurens shares his experience and offers advice for others looking to get started with blockchain.


Advertisement

three global network puzzle pieces

Third party risk management: A getting started guide

Your vendor partners may be your organization's weakest link. Without a strong third party risk management program in place, how would you know?


Gears in the form of a cloud in a binary field  >  Cloud controls

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...


nw how to shop for network shopping cart

Thoma Bravo is on a cybersecurity acquisition spree; Sophos latest to be added to cart

With five major-league cybersecurity players in its kitty already, Thoma Bravo has evolved into a formidable powerhouse in the enterprise security space.


Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
IDG Contributor Network

Rising complexity, higher stakes for enterprise risk management

As the pace of business and a shifting threat landscape challenge enterprises, optimizing risk has become a moving target.


tushar kothari ceo attivio 1200x800

‘Deception within Detection’ is the shiny armour to defeat hackers: Attivo CEO

CEO Tushar Kothari on why Attivo’s ‘Deception within Detection’ technology is turning the tables on hackers in cybersecurity defence landscape.


CSO  >  danger / security threat / malware / biohazard symbol in data center

Review: Morphisec scrambles memory to thwart advanced attacks

With Morphisec, you get a full spectrum of protection that is more complete than any antivirus program alone.


GDPR data privacy / protection / regulation / security / compliance / documentation / data / records

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR.


Advertisement

rfp write a proposal document contract signature deal agreement paper by extreme media getty
IDG Contributor Network

4 key vendor contracting pitfalls

Unless these 4 pitfalls are avoided, a vendor can have the absolute best security documents in the industry and still present material risk to its customers.


aerial view of a network of roads
IDG Contributor Network

Privacy legislation: The road ahead

The pace of change in privacy laws, and the technologies they seek to regulate, is only accelerating.


A shoe about to step on a banana peel, stopped by a small superhero.

10 risk factors no one talks about

These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.


conference speaker + audience

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.