Features

iot security startups hot highlights planets rocket lock security
digital twins woman in profile ai mirror duplicate duo pair

virtual connections / social networking / remote teams

7 VPN alternatives for securing remote network access

Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.

cloud technology protection information cybersecurity indentity

Review your on-prem ADCS infrastructure before attackers do it for you

Attacks through Active Directory Certificate Services are fairly easy for bad actors to perform but basic vigilance and built-in Windows protections can help mitigate the risk of a breach.

shutterstock deal merger acquisition

Top cybersecurity M&A deals for 2023

Fears of recession, rising interest rates, mass tech layoffs, conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A; activity...

kevin tham 16x9 thumb
video

CSO Executive Sessions with Kevin Tham, CISO at eitka

Kevin Tham, CISO at eitka, talks with host Edmund Kennedy about the dangers of disconnection between CISOs and the board.

programmer certification skills developer devops data scientist laptop by brayden george unsplash

Skilling up the security team for the AI-dominated era

Defending against AI-enabled attackers and hardening enterprise AI systems will require new security skills. Threat hunters, data scientists, developers and prompt engineers are part of the answer.

iPhone security

11 security tools all remote employees should have

Compromised employee personal devices and accounts can disrupt and possibly threaten business security. Getting these tools into their hands will help.

laid off worker layoff resignation leaving job

The hidden security risks in tech layoffs and how to mitigate them

Layoffs can be tough for both companies and employees. When grappling with anger, fear, and uncertainty, it's hard for anyone to be at their best. Here are some strategies for avoiding negative outcomes during layoffs.

charles gillman 16x9
video

CSO Executive Sessions Australia with Charles Gillman, CISO at SuperChoice

Charles Gillman, CISO at SuperChoice, discusses ChatGPT and the threats posed when tech such as chatbots and deepfakes combine.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Why Russia's cyber arms transfers are poor threat predictors

Sharing cyber tools and technology with nations such as Iran or North Korea has limited impact without also providing operational and organizational support.

corporate security insider threat hacker spy cybersecurity human resources

Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators

The US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.

01 intro crowd conference

Most interesting products to see at RSA Conference 2023

These are the tools, platforms, and services that the CSO team recommends RSA Conference attendees check out.

1798109056 decision making ciso soc

Siemens focuses on zero trust, legacy hardware, supply chain challenges to ensure cybersecurity of internal systems

Siemens US chief cybersecurity officer Helen Negre discusses how the organization is focusing on zero trust to ensure the security of internal systems across its different lines of business.

north dakota state capitol

North Dakota turns to AI to boost effectiveness and efficiency of its cybersecurity

The 19th-largest state in the US partnered with a cybersecurity vendor to shore up its defenses and take the pressure off staff. Artificial intelligence and machine learning have taken on big roles in the upgrade process.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Time-lapse photography of busy pedestrian traffic on a city street.

Top risks and best practices for securely offboarding employees

Outgoing employees pose significant security risks to organizations. Here are some of the major issues with offboarding and what CISOs can do to make staff offboarding strategies more resilient.

innovation co innovation startup venn overlapping partnering iot by pettycon via pixabay

19 startups to check out at RSA Conference 2023

Young vendors of identity and access management, application security, and third-party risk solutions dominate the list of startups exhibiting at RSA.

Raza Nowrozy
video

CSO Executive Sessions Australia with Raza Nowrozy, CISO at Untapped Talent

CSO Executive Sessions Australia with Raza Nowrozy, CISO at Untapped Talent, on contemporary cyber security challenges in Australia, growing the pathways available to people from all backgrounds to work in the field, and what steps...

shutterstock 1869308242 team putting together a chain of gears teamwork coordination collaboration

7 cybersecurity mindsets that undermine practitioners and how to avoid them

CISOs and other security practitioners can sometimes see things from a negative perspective, which is understandable given the nature of the job. But correcting how we see the role of cybersecurity can lead to much more positive...

Load More