Category: CSO Online

BrandPost: Zero Trust Part 1: Demystifying the Concept

Zero Trust technologies top the list for “most researched” solutions, according to the most recent IDG Security Priorities study. That’s likely because CSOs and CISOs are trying to wrap their arms around how best to protect their enterprises, considering how…

Episode 7: Security in a time of crisis

The biggest risk from the scramble to move to remote work at scale will likely be an increase in data exposed from misconfigured cloud storage buckets, says Christopher Burgess, a writer and speaker on security issues and former senior security…

7 PSD2 questions every CISO should be prepared to answer

The revised Payment Services Directive (PSD2) has come into effect in the European Union last year, adding new requirements for financial institutions, payment services providers and merchants who do business in the shared market. But it could also have an…

How one healthcare CISO is navigating the COVID-19 crisis

Gourav Mukherjee is a managing partner at vCISO firm Immersion Security. Since January he has been acting CISO at a private equity-backed healthcare company with hundreds of locations across the US. In addition to managing security for the organization, Mukherjee…

Best antivirus software: 13 top tools

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Five of the 15 products tested earned a perfect rating of 6 for each of those criteria: F-Secure PSB…

What is WireGuard? Secure, simple VPN still in development

WireGuard definition WireGuard is a security-focused virtual private network (VPN) known for its simplicity and ease of use. It uses proven cryptography protocols and algorithms to protect data. Originally developed for the Linux kernel, it is now deployable on Windows,…

12 top IDS/IPS tools

An intrusion detection system (IDS) is a longtime staple of IT security; it’s a software application or physical appliance that monitors networks, hosts, or both for signs that an intruder has broken into your IT infrastructure. Many such tools integrate…

10 Slack security tools compared

Slack is fast becoming one of the most popular communication and collaboration tools for business, corporate and professional users. Its elegant interface and overall ease of use has allowed Slack to outpace most other instant messaging deployments. With over 10…

3 ways COVID-19 is changing CISO priorities

According to ESG research, 62% of organizations were poised to increase spending on cybersecurity in 2020.  Thirty-two percent of survey respondents said they would invest in cybersecurity technologies using AI/ML for threat detection, followed by data security (31%), network security…

Dealing with the downturn

As the coronavirus pandemic builds, businesses are already reeling from the economic impact. Here’s how IT can adjust to a new reality of cost trimming and budget cuts.   Advertise on IT Security News. Read the complete article: Dealing with…

10 identity management metrics that matter

A changing data landscape, the proliferation of credential-based threats, and a tougher regulatory environment is creating pressure for organizations to deploy identity and access management (IAM) systems, even though the systems can be a bear to get right. [ Learn…

5G without governance is risky business

It is easy to understand the enthusiasm around the rise of 5G technology. In an era in which speed and connectivity are foundational ingredients in enterprises’ growth strategy, 5G presents unprecedented potential for businesses to innovate rapidly. Factor in the…

Security Recruiter Directory

Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and…

Dear future victim, please panic

Dear Victim, Please panic. Cower in the corner under a toilet paper fort with a pile of ammo for a pillow. Meanwhile, I’m hacking your corporate network. Work from home, they said. Self-isolate, they said. Avoid contagion, they said. They…

Episode 6: Building security in

We can all remember a time not so long ago when security was thedepartment of no. “We have moved past that to ‘yes, but,’” says MikeTowers, CSO at Takeda Pharmaceuticals International. For Towers, gettingto a place where it is easy…

The CSO guide to top security conferences, 2020

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…

4 steps to build redundancy into your security team

Avoid central points of failure or compromise. This fundamental tenet of information security applies not only to systems and networks, but to individuals during a time of pandemic. Key cybersecurity staff, more often than not, possess singular knowledge of an…

BrandPost: COVID-19 Social Engineering Attacks

As people around the world are faced with fears and concerns over the COVID-19 virus, criminals are also taking note. And unfortunately, they are using this as an opportunity to try and steal money and personal information by generating social…

BrandPost: COVID-19 Social Engineering Attacks

As people around the world are faced with fears and concerns over the COVID-19 virus, criminals are also taking note. And unfortunately, they are using this as an opportunity to try and steal money and personal information by generating social…

The 14 biggest data breaches of the 21st century

Not long ago, a breach that compromised the data of a few million people would have been big news. Now, breaches that affect hundreds of millions or even billions of people are far too common. About 3.5 billion people saw…

6 ways attackers are exploiting the COVID-19 crisis

While organizations can take plenty of steps to ensure employees are well-equipped to work remotely in a secure manner, threat actors of all stripes are already taking advantage of the COVID19/coronavirus situation. Never ones to miss an opportunity, attackers are…

A security guide for pandemic planning: 7 key steps

The ongoing worldwide outbreak of coronavirus disease (COVID-19), which originated in Wuhan, China, in December 2019, continues to grab headlines. As of mid-February 2020, more than 70,000 cases had been confirmed. The World Health Organization (WHO) has declared the outbreak…

Navigating the pandemic

Nearly every technology company — and almost every business — is desperately determining how to use its arsenal of technology to combat the increasingly severe disruption caused by coronavirus.   Advertise on IT Security News. Read the complete article: Navigating…

Toward a common UI for security operations

It’s 2020, yet many organizations still depend upon a myriad of disparate point tools for security operations, leading to many challenges.  According to ESG research these are the biggest challenges associated with managing an assortment of point tools: To read…

The 10 most powerful cybersecurity companies

Anyone who ever attended an RSA conference understands that cybersecurity vendors introduce hundreds of amazing, innovative products every year. But C-level execs aren’t looking for the flashiest new point products. Faced with a severe shortage of security professionals and up…

The CSO guide to top security conferences, 2020

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…

6 security metrics that matter – and 4 that don’t

One of the most challenging executive tasks for CISOs is quantifying the success and the value of the cybersecurity function. Indeed, security leaders and their organizations have used a myriad of metrics over the years. Yet, many executives and board…

Episode 5: In security, soft skills are king

For Chad Teat, CISO of Atlanta-based specialty retailer Floor & Decor, the secret to balancing risk and business opportunity comes down to reducing friction with the business. To do that, Teat says, the CISO, engineers, and analysts all need to…

10 biggest cybersecurity M&A deals of 2019

2019 was another big year for mergers and acquisitions (M&A) in the cybersecurity industry. According to Momentum Cyber, more than 150 deals totaling more than $23 billion in value took place this year. Four billion-dollar deals have occurred in the…

Making the case for hardware 2FA in the enterprise

Phishing and credential stuffing attacks are two of the biggest threats to any large organization, but two-factor authentication (2FA) —especially hardware 2FA — is remarkably effective in mitigating such attacks by an order of magnitude or more. To read this…

RSA 2020: 7 trends and takeaways

RSA 2020 had an uninvited guest, Covid-19.  Fist bumps replaced handshakes and hand sanitizing stations were spread throughout the Moscone Center.  Attendance seemed to be down due to factors like the virus panic and the withdrawal of major players like…

How Visa built its own container security solution

Like many large enterprises, financial services giant Visa has embraced containerization technologies that enable companies to move from legacy monolithic apps to microservice-based application architectures that are easier to maintain, update and deploy at scale on cloud infrastructure. But splitting…

10 biggest cybersecurity M&A deals of 2019

2019 was another big year for mergers and acquisitions (M&A) in the cybersecurity industry. According to Momentum Cyber, more than 150 deals totaling more than $23 billion in value took place this year. Four billion-dollar deals have occurred in the…

Intel CSME flaw is unpatchable, researchers warn

Last May, Intel released firmware patches for vulnerabilities affecting several hardware security features in its chipsets that are used for digital rights management, device attestation, firmware validation, safe storage of cryptographic keys, disk encryption and more. A team of security…

IT Salary Survey: Do tech certifications pay off?

In our recent survey, we asked IT professionals if certifications helped them land a job, earn a promotion or get a pay raise, and which certifications they’re planning to pursue. Here’s what we learned.   Advertise on IT Security News.…

How to write an effective information security policy

An information security policy is the foundation of an enterprise security program, ideally establishing in clear language what the organization expects from its security operations based on both its tolerance for risk and on its regulatory obligations. To read this…

How Target evolved its threat hunting program: 3 key steps

Threat hunting – proactively searching through your own company’s networks to hunt for attacks that might evade other security measures – often signifies a company with a mature and well-resourced security organization. But just as threat actors are constantly evolving,…

5 standout products from RSA 2020

The world’s largest security show, RSA, was held last week in San Francisco.  Over the week, tens of thousands of people flocked to the Moscone Center to check out the almost 800 vendors and hundreds of speakers to educate themselves…

4 ways 5G will change your enterprise threat model

With 5G poised to become widely available across the globe, enterprise organizations need to seriously consider the security implications of deploying the technology. To read this article in full, please click here (Insider Story)   Advertise on IT Security News.…

Secrets of industry-hopping CSOs

Conventional wisdom says that a detailed understanding of the unique business functions of a particular industry is required to translate cybersecurity threats into the business risk language that other public and private sector executives expect – or even demand. For…

Security Recruiter Directory

Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and…