Videos
CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
If you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you h...
Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of "trust no one". We explain the concept in this video.
To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Know...
Artificial intelligence and its effect on cybersecurity (both good and bad) was one of the hottest topics at the annual Black Hat security conference in Las Vegas. Keith chats with security writer and editor Joan Goodchild about the biggest trends fr...
Years of security solutions have not made the Internet more secure, as reports of new attacks and data breaches occurring regularly. The issue is a broken system based on an incorrect assumption of what security is. Keith talks with Wes Kussmaul, CTO...
ChatGPT and other AI tools can create content that helps bad actors create better phishing emails or generate malware/ransomware code. But on the other side of the coin, the tools can better educate users about security threats, identify bugs and vul...
Recently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations a...
VPNs are a remote work staple, but they’re hardly the most secure way to access corporate data. CSO Online’s UK Editor, Michael Hill, joins Juliet to explain why overreliance on VPNs poses a security risk, and what alternatives enterprises should...
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean for organizations.
XDR is one of security's buzziest acronyms—and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security...
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud...
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. CISO Omar Khawaja...
Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to tran...
With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if the...
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization mu...
SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.
Sponsored Links