Slideshows

CSO: Have you met these hackers? [slide 01]
01 hot products at rsa 2018

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

Insider threat examples: 7 insiders who breached security

You can build a wall, set up perimeter defenses, and spend massive resources maintaining it all. But if your enemy is within, that wall will do you no good.

man with megaphone yelling buzzwords

10 security buzzwords that need to be put to rest

Having trouble getting your message across? Banning these buzzwords may help.

intro breaches getting someone fired

The buck stops here: 8 security breaches that got someone fired

Some deserved the blame, and some seemed to just be at the wrong place at the wrong time.

2 linux malware scarier

Linux antivirus and anti malware: 8 top tools

Malware and viruses on a Linux system? You weren’t operating under the illusion that using Linux meant you don’t have to worry about that, were you? Fake news!

security disasters intro

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security

phishing hack scam malware binary code

15 real-world phishing examples — and how to recognize them

How well do you know these crafty cons?

free wifi stumbling surveying 1

8 free Wi-Fi stumbling and surveying tools

Here are 8 free Wi-Fi stumbling and surveying tools to reveal important details about Wi-Fi networks.

state of infosec 2018 intro

Information security, 2018: What we have here is a failure to plan

Information security increasingly has a place in corporate leadership, but plenty of companies are still failing to make the plans they need to keep up.

dos primary

6 DoS attacks that made headlines

As times have changed, so have these venerable attacks.

idg cybercrime slide1

The current state of cybercrime

CSO’s 2017 U.S. State of Cybercrime report reveals what IT and security pros fear, how they protect their data, what worked, and what they spend on cyber security.

intro sneaky malware2

The 10 sneakiest hacker attacks

Malware capable of sneaking past your defenses is the Holy Grail of the criminal world. Know your enemy. Here are the 10 sneakiest ways hackers breach your stronghold.

03 bounty hunter

10 things threat hunters watch for

Pursuing cyber threats is much like conventional hunting in that it requires patience, persistence and a keen eye, and when done correctly, it can be both exhilarating and rewarding. Threat actors do everything in their power to blend...

maze lost question direction wayward

5 common ways businesses lose valuable data

David Zimmerman, CEO and Founder of LC Technology, lists five ways individual employees and IT are causing companies to lose data, and some best practices for preventing a crippling data loss.

3 auditors

The most common errors identified in professional DNS audits

Chris Roosenraad, director of DNS Services at Neustar, shares some of the most common errors observed during audits of its customer’s DNS infrastructure and the best practices you can take to ensure you are maximizing your DNS...

shadowy attacker hooded

How to maintain data oversight to avoid ‘shadow data’

As more companies take a liberal approach to cloud app provisioning, they need to make sure that all apps – including vetted ones – are carefully secured, optimized and monitored. Al Sargent, senior director at OneLogin, offers the...

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

0 iot intro smart appliances

Six things you need to know about IoT security

It’s in every company’s best interest to “do” IoT correctly, which will mean ratcheting up security measures to capture and ensure a good customer experience. Jack Nichols, director of product management at Genesys, proivdes six ways...

Load More