Quantcast
Channel: CSO Online - Stories by David Geer RSS feed
Browsing latest articles
Browse All 15 View Live

What enterprise should do when helpless employees lose hope in fighting cyber...

Hit too many times with successful attacks and compromises, an enterprise's human resources can develop a victim mentality, a.k.a. learned helplessness. When this happens, employees who feel they are...

View Article



Why are there still so many website vulnerabilities?

The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a...

View Article

8 penetration testing tools that will do the job

If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the...

View Article

Dropbox security chief defends security and privacy in the cloud

Patrick Heim is the (relatively) new head of Trust & Security at Dropbox. Formerly Chief Trust Officer at Salesforce, he has served as CISO at Kaiser Permanente and McKesson Corporation. Heim has...

View Article

Send attackers on a wild goose chase with deception technologies

Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per "The Global State of Information Security Survey 2015" from PwC.

View Article


The evolution of DevOps: the perfect storm for instituting secure coding...

The nature of DevOps development approaches eases, invites, cries out for secure coding practices.

View Article

How to keep viral memes from spreading malware in your enterprise

CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze...

View Article

Emerging technologies are poking holes in security

Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed...

View Article


How to mitigate hackers who farm their victims

Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.

View Article


SWIFT has not seen its last 'bank robbery'

Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.

View Article

SWIFT speaks on fraudulent messages and the security moves the cooperative is...

SWIFT is using a multipronged approach to address interbank messaging fraud.

View Article

How to get your infrastructure in shape to shake off scriptable attacks

According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will...

View Article

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware.

View Article


Securing risky network ports

CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.

View Article

State-of-the-art multifactor authentication (MFA) technologies

Multifactor authentication offers more, better factors/options to protect credentials and data than ever.

View Article

Browsing latest articles
Browse All 15 View Live




Latest Images