Tuesday, March 31, 2020

12 top IDS/IPS tools

An intrusion detection system (IDS) is a longtime staple of IT security; it's a software application or physical appliance that monitors networks, hosts, or both for signs that an intruder has broken into your IT infrastructure. Many such tools...

Security School: Enroll today and advance your tech career

Insider Pro and CertsNexus have created a virtual classroom where subscribers can learn and test their cybersecurity readiness.

BrandPost: Retail Resiliency: Securing and Enabling Innovation During Uncertain Times

If there is one thing that I know, it’s that retail is resilient. Unlike any other industry, retail has continuously needed to adapt and transform to meet customer demands, remain competitive, or react to economic downturns caused by domestic...

BrandPost: Considerations for Addressing Additional Security Needs for Remote Workers

By now, most organizations responding to the current global pandemic have already moved their workforce to their homes using a secure remote worker system that includes an endpoint VPN client, online teleconferencing systems, and a headend VPN concentrator. But...

10 Slack security tools compared

Slack is fast becoming one of the most popular communication and collaboration tools for business, corporate and professional users. Its elegant interface and overall ease of use has allowed Slack to outpace most other instant messaging deployments. With over...

BrandPost: Basic Enterprise Security Hygiene is Still Essential

Basic security hygiene, such as patching and updates are time-consuming and never-ending for IT security personnel.“It’s no shocker that patching causes a lot of fatigue and anxiety,” says Sean Frazier, Advisory CISO at Cisco. “Many organizations have a long...

3 ways COVID-19 is changing CISO priorities

According to ESG research, 62% of organizations were poised to increase spending on cybersecurity in 2020.  Thirty-two percent of survey respondents said they would invest in cybersecurity technologies using AI/ML for threat detection, followed by data security (31%), network...

Dealing with the downturn

As the coronavirus pandemic builds, businesses are already reeling from the economic impact. Here's how IT can adjust to a new reality of cost trimming and budget cuts.

How to protect remote works from the coronavirus crime wave

As predicted, the coronavirus crisis is bringing out the worst in cybercriminals. But the attacks are really just old exploits modified to exploit the new coronavirus context. Here’s how to beat them.

10 identity management metrics that matter

A changing data landscape, the proliferation of credential-based threats, and a tougher regulatory environment is creating pressure for organizations to deploy identity and access management (IAM) systems, even though the systems can be a bear to get right.To read...

Cybercriminal group mails malicious USB dongles to targeted companies

Security researchers have come across an attack where an USB dongle designed to surreptitiously behave like a keyboard was mailed to a company under the guise of a Best Buy gift card. This technique has been used by security...

5G without governance is risky business

It is easy to understand the enthusiasm around the rise of 5G technology. In an era in which speed and connectivity are foundational ingredients in enterprises’ growth strategy, 5G presents unprecedented potential for businesses to innovate rapidly. Factor in...

How remote access tools can help your businesses adapt to the coronavirus

Coronavirus has created unprecedented challenges for companies and their employees across the globe and remote access tools are helping them meet them.

Security Recruiter Directory

Looking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop.The recruiters listed below can help you find your next Chief Security Officer (CSO), Chief Information Security Officer (CISO), or VP of Security and...

Dear future victim, please panic

Dear Victim,Please panic.Cower in the corner under a toilet paper fort with a pile of ammo for a pillow. Meanwhile, I'm hacking your corporate network.Work from home, they said. Self-isolate, they said. Avoid contagion, they said. They forgot about...

Chinese hacker group APT41 uses recent exploits to target companies worldwide

Security researchers warn that a Chinese cyberespionage group has been attacking organizations worldwide by exploiting vulnerabilities in popular business applications and devices from companies such as Cisco, Citrix and Zoho. In light of the ongoing COVID-19 crisis, the risk...

Episode 6: Building security in

We can all remember a time not so long ago when security was thedepartment of no. “We have moved past that to ‘yes, but,’" says MikeTowers, CSO at Takeda Pharmaceuticals International. For Towers, gettingto a place where it is...

How CISOs and data privacy officers should work together

Since the introduction of the European Union’s GDPR legislation the role of the Data Protection Officer (DPO) has exploded within businesses in Europe and across the world. Within a couple of years, the role has gone from niche to...

Securing Windows and Office in a time of COVID-19: update policies, remote options

The stay-at-home alerts for many large cities, US states, and countries is putting information technology and security professionals on the forefront of the battle to keep businesses up and running with most employees working remotely. Technology has risen to...

The CSO guide to top security conferences, 2020

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your...

Huawei’s Worrying New China Problem Just Got Worse: Here’s Why

Huawei used its 2019 results to threaten retaliation against the U.S. But the company now has serious problems closer to home.

Palantir, The $20 Billion, Peter Thiel-Backed Big Data Giant, Is Providing A Coronavirus Monitoring Tool To The CDC

Palantir will help the Centers for Disease Control keep on top of ventilator and mask needs to treat coronavirus victims, sources say.

Defense Evasion Dominated 2019 Attack Tactics

Researchers mapped tactics and techniques to the MITRE ATT&CK framework to determine which were most popular last year.

Watering-Holes Target Asian Ethnic Victims with Flash Update Decoy

About 10 compromised websites employ a multi-stage, targeted effort to fingerprint and compromise victims.

OpenWRT is vulnerable to attacks that execute malicious code

Enlarge (credit: OpenWRT) For almost three years, OpenWRT—the open source operating system that powers home routers and other types of embedded systems—has been vulnerable to remote code-execution attacks because updates were delivered over an unencrypted channel and digital...