Advertisement

CSO > A man holds a magnifying glass over the terms of a document / contract / insurance / invoice

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy.


Conceptual image of executives; silhouettes in motion with a virtual global network overlay.

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor.


cybersecurity budgets

How do you calculate cybersecurity ROI?

In today’s business landscape, the right metric is to get a return on investment. The best measures to evaluate this could be quantitative as well as qualitative. Both are linked to revenue growth directly or indirectly but use...


Advertisement

audience listens to speaker lecture at a conference presentation

The CSO guide to top security conferences, 2020

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.


Insider Pro | Computerworld  >  Salary Survey [2020]

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers' top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.


CSO > Password elimination [conceptual password security lock in a trash bin]

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security.


DDOS attack

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...


Blue Hexagon network security

India’s C-Suite exploring deception technology to fight cyber crime

In the maze of network security, it’s imperative to block all the entrants to make it inescapable for the attackers. Tech leaders in India are warming up to the benefits of deception technology to strengthen their security posture in...


cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.


Advertisement

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....


Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.


budget piggy bank spending savings security spending
Cybersecurity Snippets

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities.


Windows security and protection [Windows logo/locks]

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.


cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Episode 3: Succeeding with security as code

Podcast Episode 3: Listen now as Marnie Wilking, global head of security & technology risk management at Wayfair, talks about why the shift to the cloud requires a new set of security skills.