Advertisement

cw multicloud forum article 1

Computerworld Multicloud Forum

Virtual Event - 9.30am BST

At this half-day virtual event you will hear from experts and end users who are well on the path to cloud transformation, to help you set an effective multicloud strategy and create the flexible, dynamic architecture your business needs for sustained future success.

Advertisement

bucket with holes breach security vulnerability

Microsoft Azure Blob leak a lesson to CISOs about cloud security responsibility

Microsoft's apparent misconfiguration of its own cloud bucket exposed third-party intellectual property. Here are the takeaways for CISOs.


A virtual sphere of photos of individuals appears against a cityscape.

3 steps to smarter cybersecurity hiring and team building

Amid the global cybersecurity skills shortage, organizations and security leaders must shift their hiring and team development approach to have fewer barriers, be more diverse, and take the long view.


uk flag 5g network internet smart city by jamesteohart getty 2400x1600

NCSC releases cybersecurity principles for smart cities amid warnings of cyberattacks

The NCSC has published a new set of principles for the secure design, management and building of smart cities to protect them from cyber threats.


A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


Advertisement

hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.


Conceptual binary vault security mechanism.

Home and foreign secretaries Patel and Raab to speak at UK government’s flagship cybersecurity event CyberUK 2021

Delivered by the NCSC, cybersecurity event will explore building a resilient and prosperous digital UK following the COVID-19 pandemic.


iot security startups hot highlights planets rocket lock security

8 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...


Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.


Conceptual image of three figures running toward a goal, along trend lines drawn by a large hand.

5 key qualities of successful CISOs, and how to develop them

CISOs today need significantly different skillsets to cybersecurity leaders of the past as they become more critical to business success.