Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions which will feature conversations with leading security and risk executives from around the country about the challenges faced by their organizations. You’ll hear from some of…
Tag: CSO Online
Get this essential cloud security certification training bundle for only $49
Most businesses operate via the cloud. That means now is an ideal time to consider a career keeping them secure. But that doesn’t necessarily mean that you’d have to go back to school for professional training. Instead, you can easily…
Hiring scarce security talent: 8 secrets to working with recruiters
Alex Holden has a problem that plagues most other CISOs: he’s almost always short staffed and looking to hire. To read this article in full, please click here (Insider Story) Advertise on IT Security News. Read the complete article:…
Inspecting TLS-encrypted traffic with mitmproxy
Mitmproxy is a free, open-source tool whose killer feature is the ability to inspect Transport Layer Security (TLS)-encrypted mobile phone app traffic. The tool is superior to Wireshark when it comes to examining TLS-encrypted network traffic, and its zero-dollar price…
Moving security operations to the cloud
Sisyphus could be the official mascot of security operations. To read this article in full, please click here (Insider Story) Advertise on IT Security News. Read the complete article: Moving security operations to the cloud
What is security’s role in digital transformation?
Two years ago, digital transformations had kicked into high gear, with new processes and product development moving ahead at breakneck speed. As IT and business fast-tracked initiatives like agile and DevOps to improve speed to market, security considerations were often…
5 ways to improve your security posture in 2020
Billions of records were exposed through thousands of data breaches in 2019. Ransomware continues to loom large as a threat, with cybercriminals adopting ever more sophisticated approaches to attack. Regulatory compliance has proven challenging for corporations and government organizations alike.…
The CSO guide to top security conferences, 2020
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…
The CSO guide to top security conferences, 2019
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…
What is a false flag? How state-based hackers cover their tracks
False flag definition A false flag cyberattack is when a hacker or hacking group stages an attack in a way that attempts to fool their victims and the world about who’s responsible or what their aims are. The techniques used…
Winning the war for cybersecurity talent
The numbers aren’t encouraging for CISOs looking to hire security professionals: The U.S. cybersecurity labor market is short about 500,000 workers, according to a recent report from the nonprofit training group (ISC)². To read this article in full, please click…
How to fix insecure LDAP binds to prevent exposed Windows admin credentials
First the good news: Microsoft planned to release a patch in January to disable insecure LDAP channel binding and LDAP signing to more secure configurations. As a result of businesses asking for more time due to the holiday season, Microsoft…
Review: How Fugue protects cloud assets
We have evaluated quite a few cloud security platforms designed to bring the same high level of cybersecurity protections found on physical assets to the more nebulous and constantly-evolving cloud environment. Although they have used various technologies and techniques, the…
Protocol analyzers: Who needs them, and how to choose one
The complexities of a modern corporate network with multiple physical locations, cloud presence, and even serverless applications means the task of monitoring your network activity requires a significant amount of planning and design. A portion of this design effort begins…
How to stop email spoofing of parked domains
Deploying DMARC to prevent email spoofing is a no-brainer. No one wants spoofed email from @yourdomain.com that could easily lead to a successful phishing attack or business email compromise (BEC). But have you deployed DMARC (Domain-based Message Authentication, Reporting and…
Backdoors and Breaches incident response card game makes tabletop exercises fun
There’s a new, fun way to run a realistic incident response tabletop exercise, and it’s called Backdoors and Breaches. Inspired by Dungeons and Dragons (B&B instead of D&D), the game includes a pack of custom playing cards and a 20-sided…
2020 outlook for cybersecurity legislation
As the partisan divide in Washington widens during this 116th Congress, the prospects of enacting any meaningful legislation that bolsters the nation’s cybersecurity seem, at first blush, dim. Of the nearly 300 pieces of legislation that touch on some aspect…
Will spam die in 2020?
The problem with spam isn’t that it’s a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media. Advertise on IT Security News. Read the complete article: Will spam die in 2020?
Security Recruiter Directory
Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and…
Cybersecurity in 2020: Vigilance and the human element
Todd Inskeep, of Booz Allen Hamilton and the RSA Conference Advisory Board, writes that individuals must remain vigilant to stay a step ahead of those wishing to inflict chaos. Here’s how humans and technology can work together in 2020 to…
Two tips to make multifactor authentication for Office 365 more effective
Multifactor authentication (MFA) is a key tool in ensuring that your Office 365 – and any online application – will be secure in the cloud. For those with Microsoft 365 here are some tips to ensure you provide maximum protection…
7 security incidents that cost CISOs their jobs
CISOs can leave their job for any number of reasons, but a breach or other security incident often hastens their departure. [ Find out what are the top cyber security certifications, who they’re for, what they cost, and which you…
Review: How Divvy Cloud protects cloud deployments
These days most enterprise organizations deploy more than one kind of cloud, whether public, private or hybrid, and different company divisions, office locations or even projects can be working with multiple cloud providers. Many also are starting to implement containerization…
Top 5 states for cybersecurity jobs
It should come as no surprise that information security professionals remain a hot commodity. That has been the case for several years now. To read this article in full, please click here (Insider Story) Advertise on IT Security News.…