Tag: CSO Online

Introducing ‘CSO Executive Sessions’

Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions which will feature conversations with leading security and risk executives from around the country about the challenges faced by their organizations. You’ll hear from some of…

Inspecting TLS-encrypted traffic with mitmproxy

Mitmproxy is a free, open-source tool whose killer feature is the ability to inspect Transport Layer Security (TLS)-encrypted mobile phone app traffic. The tool is superior to Wireshark when it comes to examining TLS-encrypted network traffic, and its zero-dollar price…

Moving security operations to the cloud

Sisyphus could be the official mascot of security operations. To read this article in full, please click here (Insider Story)   Advertise on IT Security News. Read the complete article: Moving security operations to the cloud

What is security’s role in digital transformation?

Two years ago, digital transformations had kicked into high gear, with new processes and product development moving ahead at breakneck speed. As IT and business fast-tracked initiatives like agile and DevOps to improve speed to market, security considerations were often…

5 ways to improve your security posture in 2020

Billions of records were exposed through thousands of data breaches in 2019. Ransomware continues to loom large as a threat, with cybercriminals adopting ever more sophisticated approaches to attack. Regulatory compliance has proven challenging for corporations and government organizations alike.…

The CSO guide to top security conferences, 2020

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…

The CSO guide to top security conferences, 2019

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…

Winning the war for cybersecurity talent

The numbers aren’t encouraging for CISOs looking to hire security professionals: The U.S. cybersecurity labor market is short about 500,000 workers, according to a recent report from the nonprofit training group (ISC)². To read this article in full, please click…

Review: How Fugue protects cloud assets

We have evaluated quite a few cloud security platforms designed to bring the same high level of cybersecurity protections found on physical assets to the more nebulous and constantly-evolving cloud environment. Although they have used various technologies and techniques, the…

Protocol analyzers: Who needs them, and how to choose one

The complexities of a modern corporate network with multiple physical locations, cloud presence, and even serverless applications means the task of monitoring your network activity requires a significant amount of planning and design. A portion of this design effort begins…

How to stop email spoofing of parked domains

Deploying DMARC to prevent email spoofing is a no-brainer. No one wants spoofed email from @yourdomain.com that could easily lead to a successful phishing attack or business email compromise (BEC). But have you deployed DMARC (Domain-based Message Authentication, Reporting and…

2020 outlook for cybersecurity legislation

As the partisan divide in Washington widens during this 116th Congress, the prospects of enacting any meaningful legislation that bolsters the nation’s cybersecurity seem, at first blush, dim. Of the nearly 300 pieces of legislation that touch on some aspect…

Will spam die in 2020?

The problem with spam isn’t that it’s a time-wasting annoyance, but that it drives us away from phone calls and emails to bad media.   Advertise on IT Security News. Read the complete article: Will spam die in 2020?

Security Recruiter Directory

Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and…

7 security incidents that cost CISOs their jobs

CISOs can leave their job for any number of reasons, but a breach or other security incident often hastens their departure.  [ Find out what are the top cyber security certifications, who they’re for, what they cost, and which you…

Review: How Divvy Cloud protects cloud deployments

These days most enterprise organizations deploy more than one kind of cloud, whether public, private or hybrid, and different company divisions, office locations or even projects can be working with multiple cloud providers. Many also are starting to implement containerization…

Top 5 states for cybersecurity jobs

It should come as no surprise that information security professionals remain a hot commodity. That has been the case for several years now. To read this article in full, please click here (Insider Story)   Advertise on IT Security News.…