Features

audience listens to speaker lecture at a conference presentation
Bingo balls read 19, 20 and 21; no. 20 at the forefront.

virus specimen / world map / binary code

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

data center / nuclear radiation symbol

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided.

tools / toolkit / binary code

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit.

partnership / teamwork / handshake

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

silver platter passwords exposed authentication hacked vulnerable security breach

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases.

Cybersecurity  >  A mysterious and intricate padlock with complex circuits

What is cybersecurity? Definition, frameworks, jobs, and salaries

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field.

Tortoise-defense formation of the Spartans  >  warfare / war games / red team binary target / attack

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security.

Job Interviewing Skills

Good tech talent is still hard to find (how to bridge the gap)

Companies have big plans for digital transformation, but the lack of skilled IT talent remains an obstacle. Here’s how to cope.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one.

access management / access control / user connections / identities

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property.

tt19 058 thumb2
video

What's on our 2019 holiday wish list | TECH(talk)

Computerworld's Ken Mingis is joined by PCWorld's Michael Simon to discuss what they're wishing for this holiday season. From existing smart home gadgets and the Mac Pro to the yet-to-be-announced 5G iPhone, Ken and Michael hash out...

A silhouette composed of a series of clocks  >  time / transition / impermanence

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards.

security threats and vulnerabilities

7 mobile security threats that may catch you by surprise

Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

laptop / networked binary data flows / world map

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

Encrypted blocks of multicolored data cubes rolling out.

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe.

executive with city montage enterprise businessman executive

New CSO appointments in India, 2019

An updated list of newly-appointed chief information security officers at organizations across India.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release.

Load More
You Might Also Like