Tag: CSO Online

Best Android antivirus? The top 8 tools

The following are the eight best business-class antivirus tools for Android, according to AV-TEST’s January 2020 evaluations of 17 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.) AV-TEST rates each…

A security guide for pandemic planning: 7 key steps

The ongoing worldwide outbreak of coronavirus disease (COVID-19), which originated in Wuhan, China, in December 2019, continues to grab headlines. As of mid-February 2020, more than 70,000 cases had been confirmed. The World Health Organization (WHO) has declared the outbreak…

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.   Advertise on IT…

Train to become a skilled Python coder for just $50

Python is one of the most widely used coding languages in the world. And, good news, it isn’t very difficult to learn — especially for those experienced using other platforms. If you want an introduction to the language, but would…

11 penetration testing tools the pros use

What is penetration testing? Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses … before attackers do. It’s like in the movie Sneakers, where hacker-consultants break into your corporate networks to…

5G security is a mess. Could digital certificates help?

As countries around the world begin deploying 5G technology, the promises of faster speeds and better service sometime obscure a host of security issues affecting the next-generation cellular technology. These security concerns exist despite improvements in data encryption, authentication and…

How to set up your network to prevent data loss

Data. Your business and computers are full of it. While much of that data is useless to anyone else, every firm has key assets that any attacker or other competitor would love to access. To read this article in full,…

BrandPost: Defining the Security Platform

Security manufacturers increasingly refer to their solutions as a platform, with the vague implication that this gives their technology a distinct advantage. The challenge, of course, is that the term platform is rather ambiguous. It simply refers to the environment…

12 hottest new cybersecurity startups at RSA 2020

Starting on February 24, the RSA Conference (RSAC) 2020 gives security vendors old and new a chance to demonstrate their capabilities. The event has become an attractive venue for startups to make their debut. This year’s crop will be demonstrating…

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers’ top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.   Advertise on IT Security News. Read the…

The CSO guide to top security conferences, 2020

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…

IT Salary Survey 2020: The results are in

Insider Pro reveals the current salaries for dozens of tech titles, details about IT workers’ top concerns, the state of the tech hiring and the tech specialties raking in the biggest compensation.   Advertise on IT Security News. Read the…

Train to become a skilled AWS expert for less than $50

The popularity of Amazon’s cloud computing platform continues to grow. That means that opportunities for IT professionals in this sector are likely to be plentiful, but only those with the proper skills will be considered for jobs. So, if you’re…

How to fight hidden malware on Windows networks

If I listed the names of services on your Windows systems, would you be able to determine which ones were real and which ones were fake? Attackers often use fake services designed to act and look like real Windows services…

Cybersecurity spending trends, 2020

It’s still early in the year so it’s worth posing some important questions: Will organizations increase their cybersecurity budgets in 2020?  If so, what are their requirements and investment priorities? To read this article in full, please click here (Insider…

Episode 3: Succeeding with security as code

As more organizations move to the cloud and to continuous deployment, security needs to “follow the ‘as code’ model,” says Marnie Wilking, global head of security & technology risk management at Wayfair. Where historically security engineers and analysts needed to…

8 steps to being (almost) completely anonymous online

Anonymity and privacy are not about closing the door when you go to the bathroom. For the individual, they might be about personal autonomy, political liberty or just protecting yourself in the digital world. For the enterprise, employee privacy mitigates…

The CIA triad: Definition, components and examples

What is the CIA triad? The CIA triad components, defined The CIA triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure. The model has nothing to do…

Is technology killing globalization?

What you need to know — and do — about the tech-driven deglobalization trend and how it’s effecting change. Your career depends on understanding how nationalism and regulations impact business.   Advertise on IT Security News. Read the complete article:…

Best antivirus software: 12 top tools

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Four of the 15 products tested earned a perfect rating of 6 for each of those criteria: Kaspersky Small…

Risk profiling gives PPD real-time view of vulnerabilities

All businesses understand they face a multitude of risks in today’s world. How they measure that risk, though, often varies across different business functions. Teams dedicated to privacy might view risk differently from those looking at industry-specific regulatory requirements, who…

6 tips for building your cybersecurity bench

On any given day, there are a multitude of concerns pulling at the mind of a Chief Information Security Officer (CISO) — from cyber criminals to patch management and from Board presentations to data loss prevention, the problems are seemingly…

5 steps to avoid credential dumping attacks

Credential dumping is a significant technique that attackers use to gain persistent access in a network. They sneak into a workstation via phishing and then leverage the typical ways that admins manage and monitor a network to find exposed credentials.…

Arcadia makes supporting clean energy easier

Nowadays, it’s easier than ever to power your home with clean energy, and yet, many Americans don’t know how to make the switch. Luckily, you don’t have to install expensive solar panels or switch utility companies to support a cleaner,…

Security Recruiter Directory

Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and…

10 biggest cybersecurity M&A deals of 2019

2019 was another big year for mergers and acquisitions (M&A) in the cybersecurity industry. According to Momentum Cyber, more than 150 deals totaling more than $23 billion in value took place this year. Four billion-dollar deals have occurred in the…

Review: LogicHub expertly automates security

It’s not only highly effective at diagnosing and countering threats, but it does so in a transparent way that is configurable and editable by users.   Advertise on IT Security News. Read the complete article: Review: LogicHub expertly automates security

With email security, some things can’t be outsourced

While outsourcing email is right for many, if not most, enterprises, it’s not enough to ensure both inbound and especially outbound email is secure. For example, outsourcing email would not prevent this from happening: To read this article in full,…

Implementation flaws make LoRaWAN networks vulnerable to attack

LoRaWAN, a long-range wireless communications technology for low-powered devices such as sensors, has been gaining popularity worldwide in smart city, industrial internet of things (IioT) and smart home projects. Even though the protocol uses built-in encryption, implementation errors are common,…

Securing the IoT is a nightmare

Currently, we have over 26-billion IoT devices running in our workplaces, offices and homes. If you’re looking for an IoT security scorecard, it looks something like this: Security Threats: 26,000,000,000, IoT Secure Devices: 0.   Advertise on IT Security News.…

Magecart-related arrests made in Indonesia

Three members of a group that infected hundreds of websites from around the world with payment card stealing malware were arrested in Indonesia, the International Criminal Police Organization (INTERPOL) announced Tuesday. The arrests are the result of a larger multi-national…

Remembering Chris Christensen

Last Friday, former IDC analyst, Chris Christensen, passed away.  I learned this sad news from my colleague John Grady who worked with Chris for many years.  Another colleague, Christina Richmond, also worked with and for Chris at IDC.  Christina and…

Closing the security gap in OT/IT convergence

Schneider Electric knows the business value of connecting its 200-plus distribution and production centers and converging them with IT systems. As more and more industrial environments are connected through sensors and actuators to produce data for proactive insights and services,…

BrandPost: Security Performance in the Age of Digital Transformation

The twin pillars of digital innovation are scalability and performance. Cloud and SD-WAN provide agility and flexibility for constantly shifting business requirements, enabling organizations to dynamically scale compute, storage, application delivery and other functions to meet the escalating demands of…

Tracking Privacy from a Risk Standpoint

One of the lasting impacts of GDPR, the European privacy regulation that went into effect in May of 2018, has been that the security function has gained an awareness of privacy. Privacy now carries with it a risk weight that…

Data on the rise: 4 new challenges security must master

You’ve likely heard that 90% of the world’s data was created over the last two years.  This phrase, often quoted, sometimes attributed, is passing through the public consciousness, on its way to becoming trivia.  Before its reduced to a ‘fun…

3 reasons you can’t fight facial recognition

The biometric backlash is but a brief blip. Resistance is futile. You WILL be identified. But is that good or bad?   Advertise on IT Security News. Read the complete article: 3 reasons you can’t fight facial recognition

What is information security? Definition, principles, and jobs

Information security definition Information security, sometimes abbreviated to infosec, is a set of practices intended to keep data secure from unauthorized access or alterations, both when it’s being stored and when it’s being transmitted from one machine or physical location…

Why multicloud security is your next big challenge

Companies deploy an average of three to five different cloud services. With an increased emphasis on security and regulatory compliance, the capability to manage these disparate systems is crucial.   Advertise on IT Security News. Read the complete article: Why…

What’s ahead for digital identity in 2020?

In 2019, the identity sector began to open its eyes, rubbing the sleep out of them, as the world awoke to the purpose and power of identity. To read this article in full, please click here (Insider Story)   Advertise…