hackathon contest computer competition hacking
keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

CSO  >  Antivirus symbol on binary background

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.

collaboration / strategy / teamwork / transformation

Rethinking collaboration: 6 vendors offer new paths to remote work

With the need for efficient collaboration tools exploding in recent months, a variety of companies hope to refine how those tools work and what they can do. We look at six now pushing the envelope.

popcorn security theater lock by madartzgraphics and dbreen via pixabay

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...

cloud security expert casb binary cloud computing cloud security by metamorworks getty 100803072 or

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.

cso exectutive sessions 3000px x 3000px

Episode 10: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 2

Podcast Episode 10: Listen now as Akamai CISO Andy Ellis and host Bob Bragdon continue their talk about the good guy/bad guy dynamic in the infosec community and why it can lead to being marginalized.

youtube thumbnails template 021020
video

How to use Microsoft’s Sysmon and Azure Sentinel logging tools

Sysmon and the cloud-based Sentinel log events to help detect when and how attackers compromised your network.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Managing vendor and supply chain risk in a recession

The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.

A conceptual representation of accessing username and password credentials.

Hashcat explained: Why you might need this password cracker

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.

digital transformation world map outsourcing iot edge computing

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

Failure frustration anger user man worker

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway.

Cybersecurity  >  Email security threats, such as phishing

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

Cybersecurity lock with the abstract circuitry of a security fabric.

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

A hacker looks out over a city amid graphs of increasing trend lines and numerical rates.

Cybercrime in a recession: 10 things every CISO needs to know

Economic downturns force cybercriminals to change focus and creates conditions for new criminals to join their ranks. Here's how to prepare.

Selecting the right people.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

Aerial view of the United States as a nationwide grid.

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage.

examining / analyzing / selecting / business data / statistics / analytics

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

Load More