What enterprise should do when helpless employees lose hope in fighting cyber...
Hit too many times with successful attacks and compromises, an enterprise's human resources can develop a victim mentality, a.k.a. learned helplessness. When this happens, employees who feel they are...
View ArticleWhy are there still so many website vulnerabilities?
The cracks in the armor of most enterprise websites are many including recurring holes in OpenSSL, PHP, and WordPress and are largely due to a combination of extensive customizations paired with a...
View Article8 penetration testing tools that will do the job
If the probability of your assets being prodded by attackers foreign and domestic doesn't scare the bejesus out of you, don't read this article. If you're operating in the same realm of reality as the...
View ArticleDropbox security chief defends security and privacy in the cloud
Patrick Heim is the (relatively) new head of Trust & Security at Dropbox. Formerly Chief Trust Officer at Salesforce, he has served as CISO at Kaiser Permanente and McKesson Corporation. Heim has...
View ArticleSend attackers on a wild goose chase with deception technologies
Midsized companies with revenues from $100 million to $1 billion spent an average of $3 million on information security as of 2014 per "The Global State of Information Security Survey 2015" from PwC.
View ArticleThe evolution of DevOps: the perfect storm for instituting secure coding...
The nature of DevOps development approaches eases, invites, cries out for secure coding practices.
View ArticleHow to keep viral memes from spreading malware in your enterprise
CSO shares the process attackers use to slip inside the enterprise through memes and games together with enterprise security policies and enforcements that help ensure the next viral internet craze...
View ArticleEmerging technologies are poking holes in security
Accelerated change challenges change management, security DevOps and emerging technologies that enable business innovation and opportunities demand fast, frequent change from the enterprise. The speed...
View ArticleHow to mitigate hackers who farm their victims
Feeling raked over? You’re not alone; someone is probably probing your low hanging fruit right now. CSO covers how hackers farm the enterprise and how companies can mitigate the risks.
View ArticleSWIFT has not seen its last 'bank robbery'
Due to antiquated security mandates, banks participating in the SWIFT messaging system are vulnerable.
View ArticleSWIFT speaks on fraudulent messages and the security moves the cooperative is...
SWIFT is using a multipronged approach to address interbank messaging fraud.
View ArticleHow to get your infrastructure in shape to shake off scriptable attacks
According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will...
View ArticleRansomware picks off broader targets with greater severity
How to protect more critical organizations from evolving ransomware.
View ArticleSecuring risky network ports
CSO examines risky network ports based on related applications, vulnerabilities, and attacks, providing approaches to protect the enterprise from malicious hackers who misuse these openings.
View ArticleState-of-the-art multifactor authentication (MFA) technologies
Multifactor authentication offers more, better factors/options to protect credentials and data than ever.
View Article
More Pages to Explore .....