Believe your employer doesn’t know about your legal problems? Think again
Companies hire a third party to scour public databases to make sure employees are not getting into legal trouble that would impact their jobs. But is it ethical? Experts explain.
View ArticleFalse positives still cause threat alert fatigue
How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.
View ArticleThird parties leave your network open to attacks
With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?
View ArticleComputer forensics follows the bread crumbs left by perpetrators
As investigators, these security pros let the clues lead them. See in a few examples how commercial software helps these techies solve the crime.
View ArticleVendors approve of NIST password draft
The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.
View ArticleTop DRaaS companies to watch
Forrester Research recently released its report naming Sungard AS, Bluelock, IBM, and iland as the top disaster recovery-as-a-service companies. See its reasoning why.
View ArticleQA Citrix CSO: How to deal with security across multiple generations of...
Citrix’s CSO Stan Black has been in the cybersecurity field for 20 years. He talks about how security has changed among employees in each generation.
View ArticleHow CISOs can answer difficult questions from CEOs
A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.
View ArticleRansomware makes healthcare wannacry
The NHS ordeal is a wakeup call to healthcare administrators as to what needs to be done to make sure patients and their data are safe. Find out what advice vendors provide.
View ArticleOutsourcing security: Would you turn over the keys to a third party?
Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of...
View ArticleA day in the life of a threat researcher
After leaving Exabeam at the end of the workday, Ryan Benson’s mind doesn’t shut off when it comes to thinking about designing new defenses against Black Hats. See what his day looks like.
View ArticleCisco security exec: ‘Connected devices are creating 277 times more data than...
CSO Managing Editor Ryan Francis recently spoke with Anthony Grieco, senior director and trust strategy officer at Cisco’s Security and Trust Organization, about how organizations can securely...
View ArticleFormer NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon
Retired Gen. Michael Hayden held nothing back when addressing cybersecurity pros at the ZertoCon conference in Boston.
View ArticleKentucky workers comp carrier survives ransomware
An overzealous Web surfer brings employee training to the forefront. See how they have tightened up the network.
View ArticleDoes third-party security awareness training work?
Rapid7 security analyst describes the company’s direction with in-house vs. outsourcing training.
View Article