This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
CSO definition. A CSO is a departmental leader responsible for information security, corporate security or both. That's the simplest answer to the question "What is a CSO?", At many companies, the term CSO is still used in this way. To read this article in full, please click here
Sign up for CSO newsletters. ]. Operating within an enclaved system means direct user access to more advanced technologies from their workstations wasn’t happening. They do have the challenge of employees using technology and applications with capabilities that far outstrip their ability to keep up.
Now, sophisticated tools and technologies are making it possible for database developers to have their cake and, to stay in metaphor, not count the calories by keeping the information private. To read this article in full, please click here (Insider Story)
This was a few years ago, and one can only guess that the role had been created by a technologist who didn’t care about or didn’t understand the business—or, inversely by a businessperson who didn’t understand enough about technology. To read this article in full, please click here In either case, the disconnect is real.
Keep up on the latest thought leadership, insights, how-to, and analysis on IT security through CSO Online’s newsletters. ]. These include things like trusted execution, virtualization, memory encryption, runtime BIOS resilience and threat detection technology ( Intel TDT ). To read this article in full, please click here
Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here All the firewalls in the world can’t help you if an attacker removes your storage media from the storage room. Learn what you need to know about defending critical infrastructure. |
Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here Both efforts aim to prepare the nation for the next significant cybersecurity incidents, making up for lost time due to the previous administration's relative inattention to the topic.
The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Sign up for CSO newsletters. ]. To read this article in full, please click here
Deepfake technology is an escalating cybersecurity threat to organizations. Get the latest from CSO by signing up for our newsletters. ] Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here Learn what makes these 6 social engineering techniques so effective. |
Check out these 11 phishing prevention tips for best technology practices, employee education and social media smarts. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
Interest in zero trust is surging, according to IDG’s 2020 Security Priorities Study, with 40% of survey respondents saying they are actively researching zero trust technologies, up from only 11% in 2019, and 18% of organizations indicating they already have zero trust solutions, more than double the 8% in 2018.
Sign up for CSO newsletters. ]. The analyst firm discovered that CISOs everywhere are struggling to justify their spending on MSSPs to non-security executives because of a lack of proper metrics and because of technology complexity—among other things. To read this article in full, please click here
She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several companies, including her former employers Coca-Cola and Eastman Chemical Company. The value placed on the development of the stolen technologies is $119.6 Sign up for CSO newsletters. ].
Many of the 2021 transactions CSO reported were in the identity and cloud security markets, especially toward the end of the year. Recorded Future’s acquisition of SecurityTrails is an early 2022 example, as it adds attack surface monitoring technology to Recorded Future’s offerings. To read this article in full, please click here
Chris Wysopal, founder and chief technology officer of application security company Veracode, sat down with CSO Senior Writer Lucian Constantin at a recent Security Summit to discuss just that. To read this article in full, please click here
Google, owner of the generative AI chatbot Bard and parent company of AI research lab DeepMind, said a framework across the public and private sectors is essential for making sure that responsible actors safeguard the technology that supports AI advancements so that when AI models are implemented, they’re secure-by-default.
Studies show that CSO readers are most likely to know that endpoint protection is the modern iteration of the antivirus tools of previous generations. To read this article in full, please click here Okay, I made that first part up, but the second part is, of course, true. Endpoint protection covers much more than antimalware.
Today, the convergence of operational technology (OT) and IT networks is accelerating because organizations can use the data collected by physical equipment and Industrial Internet of Things (IIoT) devices to identify issues and increase efficiency. To read this article in full, please click here
In May 2021, the GAO’s director of information technology and cybersecurity, Vijay A. Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here D’Souza, testified before Congress on supply chain risks.
The goal of the attacks is the theft of information about the victims' infrastructure, technology and critical assets. [ Sign up for CSO newsletters ! ] To read this article in full, please click here How well do you know these 9 types of malware and how to recognize them.
Sign up for CSO newsletters. ]. Schmitt, who is now in her early 30s, has always been passionate about technology, so she didn't buy into this. To read this article in full, please click here She shouldn't worry—maybe it's just stress.
In my last CSOarticle , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. To read this article in full, please click here
Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.
This can be attributed to a perfect storm of factors: To read this article in full, please click here In fact, a recent ransomware survey demonstrates that ransomware has become the top threat concern for most organizations globally.
To read this article in full, please click here “It’s important to understand I’m here to protect this company that is focused on human healthcare. It’s a very, very important mission that I take seriously every single day.” Allison is accustomed to missions.
First, is the tie to their current technology, which often suffers from complexity and siloed operations that prevent automation. Many organizations struggle to define the right process within their teams, technology stacks, and across users and suppliers. To read this article in full, please click here
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Sign up for CSO newsletters. ]. . Sign up for CSO newsletters. ].
To read this article in full, please click here After all, the increase in remote work naturally leads to increased insider risk. And for those who have cast their security spotlight on external threats, maybe this is a timely wake-up call to look within (quite literally).
To read this article in full, please click here But as this Infographic shows, the avidity of the threat actors’ response is a clear indicator of the need for an integrated global response to combat the cybercrime crisis.
United Technologies, which had spun off Carrier, took the existing product security function with it. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. “We We didn’t want to replicate what United Technologies was doing, because it was focused on aerospace. To read this article in full, please click here
CSO spoke with security leaders, researchers, and analysts about this significant issue and the implications for CISOs, businesses, and the wider sector. From a moral standpoint, CISOs should absolutely stop using Russian-made security and technology products. To read this article in full, please click here
The platform, Arculix, combines orchestration, passwordless technology and continuous authentication and can be deployed out of the box with any industry-standard identity provider as an end-to-end solution or as augmentation to an existing identity and access management (IAM) scheme. To read this article in full, please click here
To read this article in full, please click here Now we see that Google is jumping into the fray, with the soon-to-be-released tracking device in development apparently codenamed “Grogu” (after the Baby Yoda character in the “Star Wars” spinoff “The Mandalorian”).
CompTIA Security+ is a security certification offered by the Computing Technology Industry Association (CompTIA), a U.S.-based To read this article in full, please click here based trade and industry nonprofit. Like any well-regarded certification, CompTIA Security+ can help boost your career and your earning power.
For that reason, the National Institute of Standards and Technology (NIST) published NIST SP 800-207 Zero Trust Architecture , which describes the following seven tenets of zero trust. To read this article in full, please click here (Insider Story)
Organizations, technology providers, and internet standards will therefore soon be required to transition to quantum-safe encryption. To read this article in full, please click here
Large enterprises have been better able to adapt to this new reality, having access to larger IT budgets and skilled employees, but small and medium-sized businesses are struggling to keep up with the access control, monitoring and threat detection technologies needed to defend their local and remote assets.
While enterprises tout their efforts to accelerate digital transformation efforts, for security leaders in business there is a dark side to the rapid deployment of new technology. Meanwhile, CSOs also must help ensure their organizations are in compliance with new regulations. To read this article in full, please click here
As with many new technologies, security is lagging behind. To read this article in full, please click here (Insider Story) As companies move applications to the cloud and expose functionality via application programming interfaces (APIs), criminals have been moving quickly to take advantage of this newly exposed attack surface.
Trellix, a new company formed from the merger of cybersecurity giants McAfee Enterprise and FireEye, is intent on becoming the leader in XDR (extended detection and response) technology by combining applications from both of the formerly separate companies into an interoperable suite of products for threat prevention, detection and response.
Predicting future technological performance is tricky business — we anticipate linear growth, but experience something different. Unfortunately for us forecasters, the dichotomy between expectation and reality makes it difficult to anticipate the exponential nature of technological progress , and that holds us back as change accelerates.
Since applications, hardware, and technology systems typically ship with default settings, it’s important to review and implement recommended guidance. In this article, the Center for Internet Security (CIS) offers advice and best practices. To read this article in full, please click here
Back to being an in-person event after going virtual last year because of the pandemic, RSAC 2022 has booked a formidable mix of security startup debuts, featuring technology and approaches to security that include devsecops , identity and access management (IAM), threat management, and cloud security.
Machine learning and artificial intelligence (AI) are becoming a core technology for some threat detection and response tools. Here are the nine most common ways attackers leverage these technologies. To read this article in full, please click here Spam, spam, spam, spam.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content