Tag: CSO Online

11 cybersecurity buzzwords you should stop using right now

This article has been indexed from CSO Online Cybersecurity buzzwords and buzz phrases are a dime a dozen. Used to simplify complex terminology or boost sales and marketing campaigns, buzzwords are an inescapable reality for an innovative and fast-paced industry…

Biden’s cybersecurity executive order, a progress report

This article has been indexed from CSO Online On May 12, 2021, President Biden released a comprehensive cybersecurity executive order, EO 14028, entitled Improving the Nation’s Cybersecurity. The complex order responded to a chain of startling and damaging cybersecurity incidents…

18 cybersecurity startups to watch

This article has been indexed from CSO Online If you want to know what’s new in cybersecurity, watch what the startup vendors are doing. They typically begin with an innovative idea and are unfettered by an installed base and its…

5 steps to security incident response planning

This article has been indexed from CSO Online Breach disclosure has recently been in the news, and not necessarily in a good way. Missouri Governor Mike Parson’s press conference on a newspaper’s reporting of a security vulnerability on the Department…

BrandPost: Scary Cyber Threats and Sweet Solutions

This article has been indexed from CSO Online Do the words Zombiebots, Gh0st, Beast, and Creeper send shivers up your spine? They should. These are the names of top malware that could be haunting your programs and email right now! Building a cyber defense plan…

10 essential skills and traits of ethical hackers

This article has been indexed from CSO Online What if you could spend your days trying to gain access to other people’s networks and computer systems—and not get in trouble for it? Of course, that’s every spy and cybercriminal’s dream,…

Reddit’s Allison Miller builds trust through transparency

This article has been indexed from CSO Online Allison Miller’s official title—CISO and vice president of trust—says a lot about her role and responsibilities at Reddit. Like all CISOs, Miller oversees the cybersecurity strategy and operations at the 16-year-old company.…

Security Recruiter Directory

This article has been indexed from CSO Online Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next chief information security officer (CISO) or…

SSRF attacks explained and how to defend against them

This article has been indexed from CSO Online SSRF attack definition Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. The name itself implies that a request that should have otherwise been…

6 zero trust myths and misconceptions

This article has been indexed from CSO Online Interest in zero trust is surging, according to IDG’s 2020 Security Priorities Study, with 40% of survey respondents saying they are actively researching zero trust technologies, up from only 11% in 2019,…

Microsoft’s very bad year for security: A timeline

This article has been indexed from CSO Online So far, 2021 has proved to be somewhat of a security annus horribilis for tech giant Microsoft, with numerous vulnerabilities impacting several of its leading services, including Active Directory, Exchange, and Azure.…

Top cybersecurity M&A deals for 2021

This article has been indexed from CSO Online 2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry. March alone saw more than 40 firms being acquired. The level of activity is driven…

Edge computing: The architecture of the future

This article has been indexed from CSO Online To fully digitize the last mile of business, you need to distribute compute power where it’s needed most — right next to IoT devices that collect data from the real world. Read…

Securing the edge: 4 trends to watch

This article has been indexed from CSO Online The COVID-19 pandemic and the disruption to workplace and operational environments that it triggered have accentuated and, in some cases, exacerbated some of the security concerns around edge computing. Edge computing is…

7 VPN alternatives for securing remote network access

This article has been indexed from CSO Online Once the staple for securing employees working remotely, VPNs were designed to provide secure access to corporate data and systems for a small percentage of a workforce while the majority worked within…

6 ways the pandemic has triggered long-term security changes

This article has been indexed from CSO Online Some of the changes to IT environments prompted by the COVID-19 pandemic—primarily work-from-home (WFH) and cloud adoption—are here to stay and will require long-term revisions to enterprise cybersecurity strategies. The often hasty…

The CSO guide to top security conferences, 2021

This article has been indexed from CSO Online There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of…

Top cybersecurity statistics, trends, and facts

This article has been indexed from CSO Online 2021 has been a banner year for cybercriminals, they have taken advantage of the COVID-19 pandemic and the increase in remote work, attacking both technical and social vulnerabilities. This historic increase in…

5 steps toward real zero trust security

This article has been indexed from CSO Online Zero trust has long been the logical successor to the moat/castle perimeter security model, which hasn’t worked very well to protect enterprises from cyberattacks and is becoming increasingly outdated as employees become…

Device identity: The overlooked insider threat

This article has been indexed from CSO Online Throughout National Insider Threat Awareness Month there has been no shortage of thoughts and ideas proffered on how to manage and mitigate insider risk that comes with having humans as part of…

BrandPost: How to Automate Configuration Review

This article has been indexed from CSO Online Configuration management can be challenging. IT teams can become overwhelmed by the need to address various standards, compliance requirements, and security options. As the popularity of remote work grows, so does the…

Why today’s cybersecurity threats are more dangerous

This article has been indexed from CSO Online Over the past two years, the rise of big-ticket ransomware attacks and revelations of harmful software supply chain infections have elevated cybersecurity to the top of the government’s agenda. At the same…

Telos, Splunk and StackArmor streamline ATO compliance on AWS

This article has been indexed from CSO Online Telos, Splunk and StackArmor have teamed up to streamline US federal government ATO (Authorization To Operate) compliance for regulated defense contractors and software providers, using AWS as a foundation. The new initiative,…

Telos, Splunk and stackArmor streamline ATO compliance on AWS

This article has been indexed from CSO Online Telos, Splunk and stackArmor have teamed up to streamline US federal government ATO (Authorization To Operate) compliance for regulated defense contractors and software providers, using AWS as a foundation. The new initiative,…

New US CISO appointments, September 2021

This article has been indexed from CSO Online The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO)…

BrandPost: How Much Risk Are You Willing to Take?

This article has been indexed from CSO Online Just as the threat landscape evolves over time, so does security technology. Having been in the cyber security space for more than 15 years, I have witnessed a number of evolutions first…

CIO Think Tank: Data and analytics at scale

This article has been indexed from CSO Online The world is awash in data. So in almost every enterprise, the question looms: How can we scale data analytics to deliver the greatest possible value? Read the original article: CIO Think…

6 steps for third-party cyber risk management

This article has been indexed from CSO Online Many organizations transact with hundreds of third-party partners, according to EY’s Global Third-Party Risk Management Survey 2019-2020, a trend that PwC finds shows no sign of slowing, even as the risks increase.…

BrandPost: Opportunities for Women in Cybersecurity

This article has been indexed from CSO Online Even though jobs in cybersecurity pay well, far fewer women go into the field than men. According to the 2020 (ISC)² Cybersecurity Workforce Study, gender disparities persist around the globe. The highest percentage…

How to choose an endpoint protection suite

This article has been indexed from CSO Online Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. Okay, I made that first part up, but…

BrandPost: Gaming Industry Paves the Way

This article has been indexed from CSO Online The gaming industry produces the most cutting-edge, connected, customizable, entertainment experiences on the planet. Full stop. Currently at $200 billion per year and growing, the gaming industry has grown from humble beginnings…

Seven strategies for building a great security team

This article has been indexed from CSO Online Brennan P. Baybeck lists building a successful team as one of his top responsibilities as a CISO. “If you surround yourself with great people, make sure they’re successful and have what they…

Security Recruiter Directory

This article has been indexed from CSO Online Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next chief information security officer (CISO) or…

10 top API security testing tools

This article has been indexed from CSO Online Application programming interfaces (APIs) are a critical part of most modern programs and applications. In fact, both cloud deployments and mobile applications have come to rely so heavily on APIs that you…

Yes, the FBI held back REvil ransomware keys

This article has been indexed from CSO Online The Federal Bureau of Investigation (FBI) had the keys to REvil’s ransomware as the cybercriminals were locking up company after company’s data and did not publicly share the keys. What were they…

The Kaseya ransomware attack: A timeline

This article has been indexed from CSO Online The attack on US-based software provider Kaseya by notorious Russia-linked ransomware group REvil in July 2021 is estimated to have affected up to 2,000 global organizations. REvil targeted a vulnerability (CVE-2021-30116) in…

How to mitigate the Microsoft Office zero-day attack

This article has been indexed from CSO Online Once again attackers have used Office files in targeted attacks against Microsoft users. This time they used the Windows Explorer preview pane to deliver malicious .doc, .docm, and .docx files. Researchers have…

CRISC certification: Your ticket to the C-suite?

This article has been indexed from CSO Online What is CRISC? Certified in Risk and Information Systems Control (CRISC) is a certification that focuses on enterprise IT risk management. It’s offered by ISACA, a nonprofit professional association focused on IT…

The new math of cybersecurity value

This article has been indexed from CSO Online Jenai Marinkovic doesn’t put much stock into figures that show how many attacks she and her security team have stopped. Those numbers, she says, really don’t provide any insights. “Saying we blocked…