Features
7 VPN alternatives for securing remote network access
Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.
Review your on-prem ADCS infrastructure before attackers do it for you
Attacks through Active Directory Certificate Services are fairly easy for bad actors to perform but basic vigilance and built-in Windows protections can help mitigate the risk of a breach.
Top cybersecurity M&A deals for 2023
Fears of recession, rising interest rates, mass tech layoffs, conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A; activity...
video
CSO Executive Sessions with Kevin Tham, CISO at eitka
Kevin Tham, CISO at eitka, talks with host Edmund Kennedy about the dangers of disconnection between CISOs and the board.
Skilling up the security team for the AI-dominated era
Defending against AI-enabled attackers and hardening enterprise AI systems will require new security skills. Threat hunters, data scientists, developers and prompt engineers are part of the answer.
11 security tools all remote employees should have
Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.
The hidden security risks in tech layoffs and how to mitigate them
Layoffs can be tough for both companies and employees. When grappling with anger, fear, and uncertainty, it's hard for anyone to be at their best. Here are some strategies for avoiding negative outcomes during layoffs.
video
CSO Executive Sessions Australia with Charles Gillman, CISO at SuperChoice
Charles Gillman, CISO at SuperChoice, discusses ChatGPT and the threats posed when tech such as chatbots and deepfakes combine.
Why Russia's cyber arms transfers are poor threat predictors
Sharing cyber tools and technology with nations such as Iran or North Korea has limited impact without also providing operational and organizational support.
Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators
The US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.
Most interesting products to see at RSA Conference 2023
These are the tools, platforms, and services that the CSO team recommends RSA Conference attendees check out.
Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems
Siemens US chief cybersecurity officer Helen Negre discusses how the organization is focusing on zero trust to ensure the security of internal systems across its different lines of business.
North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity
The 19th-largest state in the US partnered with a cybersecurity vendor to shore up its defenses and take the pressure off staff. Artificial intelligence and machine learning have taken on big roles in the upgrade process.
The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
Top risks and best practices for securely offboarding employees
Outgoing employees pose significant security risks to organizations. Here are some of the major issues with offboarding and what CISOs can do to make staff offboarding strategies more resilient.
19 startups to check out at RSA Conference 2023
Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.
video