CSO staff

Stopping ransomware starts with the security pros

The CSO IoT security basics survival guide

The CSO IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks.

April 2017: The month in hacks and breaches

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April.

Report: Bad policies and practices put data at risk [Infographic]

Report: Bad policies and practices put data at risk [Infographic]

The 2017 Varonis Data Risk Report shows the scope of the risk associated with corporate data files.

The differences among the white, grey, and black hats

The differences among the white, grey, and black hats

This infographic explains why hackers are defined by the hats they wear.

March 2017: The month in hacks and breaches

March 2017: The month in hacks and breaches

Voter records, patient data, and CIO hacking tools were among the data stolen last month.

February 2017: The month in hacks and breaches

February 2017: The month in hacks and breaches

An unsecured MongoDB database, sluggishness about disclosing and patching vulnerabilities, and “I was just curious” were among the contributing factors to the month’s incidents.

The high price of security shaming [Infographic]

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches.

Secrets of successful CISOs [Infographic]

Secrets of successful CISOs [Infographic]

Who the CISO reports to matters more than you might think, but it isn’t the only secret to success.

Study: 1 in 3 website visitors is an attack bot

Study: 1 in 3 website visitors is an attack bot

And 94.2 percent of 100,000 inspected websites experienced at least one bot attack during a 90-day survey period.

Hacking the 2016 election: A timeline

Hacking the 2016 election: A timeline

Russian interference in the 2016 U.S. election played out in a series of hacks taking place over several months. Here’s how the attacks unfolded.

The problem with threat intelligence [Infographic]

The problem with threat intelligence [Infographic]

78% of security pros say threat intelligence is essential to their organization’s security, but just 27% say their organizations effectively use threat data. Why the disconnect?

Load More