6 handling email phishing
California Consumer Privacy Act  / CCPA  >  State flag / secured data

000.00 00 05 03.still001
video

What is the dark web? And what will you find there?

The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.

6 network packet analysis data binary world

Network traffic analysis tools must include these 6 capabilities

Organizations want advanced analytics, threat intelligence integration, and IoT support among other things in network traffic analysis (NTA) tools.

tf19 042 thumb update2
video

U.S. companies to resume selling to Huawei | TECH(feed)

President Trump reversed his ban on all business transactions between the U.S. and Chinese tech giant Huawei a few weeks ago. Now, some U.S. companies will soon be able to sell their tech to Huawei once again--but not without jumping...

cloud migration shipping company outsourcing global consolidation

Modernized maritime industry transports cyberthreats to sea

Attackers are equally capable of wreaking havoc whether their target is based on land or sea. Considering that more than 70 percent of the earth is covered by water, and an expanding attack surface for the vessels journeying across...

Bitcoin cryptocurrency falling.

Lack of trust will doom crytpocurrency

Loss of crypto coins through hacks, fake trading and volatility destroy trust in cryptocurrency, but those aren't its only problems.

A group of business leaders / board members with questions.

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone.

ifcr 030 thumb
video

How to use .SD in the data.table package

See how to use the special .SD symbol in the R data.table package.

microsoft windows bitlocker encryption desktop pc monitors

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help.

CSO > Micsoroft Windows logo emblazoned on a security shield in a field of abstract binary data.

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous.

cssg 018 thumb
video

How to manage Microsoft Windows BitLocker

Use these techniques to inventory your network to determine which devices have BitLocker.

nwht 032 thumb
video

How to use the setfactl and getfactl commands: 2-Minute Linux Tips

In this Linux tip, learn how to use the setfacl and getfacl commands. They allow you to establish and report on file permissions that reach beyond the traditional read, write and execute permissions on Linux systems.

Composite image of binary code and biometric fingerprint scanning authorization.

Companies with zero-trust network security move toward biometric authentication

According to new research, more companies are enabling biometric authentication on devices to verify access requests.

tf19 041 thumb
video

What the FTC’s $5 billion fine really means for Facebook | TECH(feed)

Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet...

cso siem visibility gap in security apps legacy eyes crack breach privacy

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility.

CSO  >  What is a computer virus?

What is a computer virus? How they spread and 5 signs you've been infected

A computer virus is a form of malicious software that piggybacks onto legitimate application code in order to spread and reproduce itself.

youtube thumbnails template
video

CIO Leadership Live with Rob Galvin, CTO, The Port Authority of NY and NJ

Rob Galvin, CTO for The Port Authority of NY and NJ, and host Maryfran Johnson sit down to discuss digital passports, the impact of autonomous vehicles, IT/OT convergence and more.

CSO  >  ransomware / security threat

To pay or not pay a hacker’s ransomware demand? It comes down to cyber hygiene

A recent call for city leaders to stop paying ransomware demands underscores the need for municipalities to step up their cyber practices and have a good backup process in place.

login credential - user name, password - administrative controls - access control - single sign-on

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

Load More