iot security networking privacy
Xti - 47517 red 37

XTI shoes Woman Sandals 48115 Plomo

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company.

Selecting the right people.

Cular Acci Women Ankle Strap Pumps D'Orsay

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.

Two Kinds Of People Incomplete Data High Top Classic Casual Canvas Fashion shoes Sneakers For Women & Men
network security / network traffic scanning
Pretty Good At Bad Decisions High Top Classic Casual Canvas Fashion shoes Sneakers For Women & Men

DecoStain Women's Patent-Leather Lace-Up Suqare Toe Mixed-color Flat Platform

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)


8 getting breached is bad for business
Cular Acci Women Elegant Stiletto Pumps

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

computer crime scene / hacked / infected / cybercrime / cyberattack

Why you need a cybersecurity incident response specialist

If your cyber insurance provider gives you the number of an incident response specialist, call them now. It will save time when an attack occurs.

CSO > Microsoft Azure backups / cloud computing / binary code / data transfer
Mebake sandals Sandalsfemale Students Rhinestones Wild Pointed Flat Wedding shoes Satin Low-Heeled shoes

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready.

Tiwcer Summer Women Sandalias Leopard Flat Sandals Beachslippers Flip Flops Feminina Plus Size 35-44
Women's Bow Beach Wedges Sandals Travel Casual Non-Slip Comfort Flip Flop
CLEBAO Shoulder, Korean, Fashion, Tide Sequins, Wild, College Style, School Bag

How to build a startup evaluation toolkit

In the first installment of our startup evaluation guide, we cover five essential tools you need to ensure you are heading in the right direction.

Summer Bohemia Beach Platform Bath Slippers Wedge Slope Slippers Women shoes
network security / network traffic scanning
IDG Contributor Network

Women's Slip-on Super Hidden Heel PU Wedges Platform Sneakers Non-lace Loafer

Some hard realities on the limitations of machine learning in autonomous netsec.

vmware vmworld sharpen focus
Cybersecurity Snippets

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on.

AREBULE-sandal Women Lace-up shoes Peep Toe Flat Sandals Tassel Cross Tied Beach shoes Black Sandalia


PilotageAuto Cotton Slippers Inside and Outside The House with Anti-Skid House Warm and Thick-Rooted
Japanese bowing etiquette / manners / digital connections

Ditto Leopard and Flower Texture Girl Cushion Snakers, Breathable Comfortable shoes for Girl

Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project.

Capital One  >  hack

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns.

WXMDDN Female Modern Dance shoes Silver Dancing shoes Women Adult 7cm high Heel Indoor Dance shoes Soft Soles Dance shoes Four Seasons
mobile security threat detection
BC Footwear Women's Tabby Dress Sandal

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user...

data center / network servers

DoraTasia Women's Fashion Pointed Toe Stiletto shoes Bowtie Ultr High Heel Pumps

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.

JQSM New Women's Bag Classic Wild Crocodile Pattern Ladies Handbags Style Cross-Border Fashion Single Shoulder Messenger Bag
black hat / hacker / spotlight / binary overlay
Canvas, Letters, Korean, one-Shoulder, Versatile, Simple, Crossbody Bag

Sothingoodly Pretty Women's Comfortable Fashion Stiletto Heels Lace-up Leather Booties

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses.

AIRCATMODE Womens Pointed Toe Transparen High Heel Rough Pumps Wedding Party Basic shoes
Madison Harding Women's Felice Gladiator Sandal