Advertisement

whitelisting computer security security oversight admin lockout control by metamorworks getty images

Whitelisting explained: How it works and where it fits in a security program

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it...


A hacker attacks from within a Windows system.

The most important Windows 10 security event log IDs to monitor

Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.


iot security

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.


安徽快3真准网Advertisement

iot smart devices smart home internet wireless

4 ways employee home networks and smart devices change your threat model

Home routers, printers, security systems, DVRs, gaming consoles and other smart devices can significantly change the threat model for the corporate network.


rotating square frames around a bridge path / future / change / transformation
Checks and Balances

Why frameworks are more necessary than ever for secure enterprise transformations

Taking governance shortcuts in order to quickly take advantage of competitive opportunity can lead to major failings when it comes to security and privacy and cause serious long-term damage to the business.


A laptop with a virtual overlay of abstract code and a binary skull.

Auth0 Signals analyzes logins to block bots

Auth0 Signals, a key component to the Auth0 identity management platform, analyzes login attempts against four key criteria to identify and block script-based or bot attacks.


CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?


EU / European Union / GDPR data privacy protection, regulation, compliance

General Data Protection Regulation (GDPR): What you need to know to stay compliant

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that...


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


Wireless telecommunications tower emanating concentric waves of transmission.

Senate subcommittee blasts FCC and Team Telecom approach to Chinese supply chain threats

A report claims that oversight of Chinese telecoms for security threats to the US communications supply chain is lacking and without adequate authority.


安徽快3真准网Advertisement

CSO Digital Magazine  >  Summer 2020 [cover]

Redefining the CISO role: Why the top security job is gaining C-suite and boardroom status

Breach concerns, data privacy regulations, and a move to separate security from IT are elevating the importance of the security role.


A hacker targets a sitting duck  >  easy target / easy pickings / victim targeting

Enterprise internet attack surface is growing, report shows

Attackers are taking advantage of the COVID-19 crisis to exploit pre-existing and newly introduced vulnerabilities across a wide range of attack points.


data science certification man at computer

These tech certifications not only have high value now, but employers will continue to value them as the coronavirus continues.


layered image of male executive holding thumbs up in CMYK

The coronavirus crisis has shaken up business as usual, with some IT strategies and tools rising to the occasion and others in line for a rethink or tough recovery post-pandemic.


microsoft 365 channel attributes apps

Microsoft 365 Apps update changes: What security admins need to know

Microsoft has renamed its Office 365 update channels and added options. You might have to make changes in your configuration and deployment tools.