Advertisement

cybersecurity eye with binary face recognition abstract eye
IDG Contributor Network

Why cybersecurity is a central ingredient in evolving digital business models

Rather than being a hindrance, cybersecurity best practices give you a stable foundation on which to innovate...and can be the can be the gateway to re-imagining your business model.


CSO  >  security shield / binary code / handshake / agreement / contract

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes.


rules rulebook law compliance regulation by baloon111 getty

Morrisons data breach may change the rules around liability in cyber attacks

UK companies may soon be liable for actions of rogue employees, opening them up to massive litigation claims from people affected by data breaches.


Advertisement

BlueBorne Bluetooth attack stage fright
IDG Contributor Network

Are you being tracked through a Bluetooth security vulnerability?

The Bluetooth protocol, which was never that secure to begin with, now allows the bad guys to track your location on some laptops and phones, but worse could be the entry it offers into the IoT.


fedora hat black hat detective spy

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all.


CSO  >  malware / virus / security threat / protective antivirus shield

Best antivirus software: 10 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.


European Union [EU] flag and binary code

GDPR: If the fines don’t get you, the personal claims might

With the deadline for mis-sold PPI claims coming to an end, GDPR could become the new cash cow for 'no-win, no-fee' law firms and spur a rise of class action lawsuits.


Let's Encrypt automated encryption gears
Cybersecurity Snippets

Black Hat 2019: 3 cybersecurity concerns and 3 things that give hope

At this year's Black Hat, it was evident that several cybersecurity issues remain a concern, but the industry is making progress.


Email takeover  >  Puppeteer hands manipulating the strings of an email client

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it.


international travel / security checkpoint / electronic ticketing/ inspecting personal device

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees.


Advertisement

Windows security and protection [Windows logo/locks]

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed.


Las Vegas Sign for Blackhat DefCon Event
IDG Contributor Network

Thoughts from Defcon 27 – This is why I do what I do

Every year, thousands of security professionals descend upon Las Vegas to take part in a series of conferences known as Hacker Summer Camp. This year, Black Hat, BSides Las Vegas, Defcon 27 and the Diana Initiative took up the...


Identity access management  >  abstract network connections and circuits reflected in eye

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk.


Mastery of technology skills + knowledge.

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know.


CSO > Weak/broken link

Humans are the weak link: Security awareness & education still a challenge for UK companies

A new CSO study of UK organizations suggestions human-centric security is a major priority.