CSO staff

Face-off: Oracle vs. CA for identity management

Face-off: Oracle vs. CA for identity management

Considering identity and access management (IAM) software? Download this free report for side-by-side comparisons of rival products from Oracle and CA, based on reviews written by enterprise users of the products.

The CSO guide to top security conferences

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

4 historic security events of 2016 and what they teach us [Infographic]

4 historic security events of 2016 and what they teach us [Infographic]

From the massive data breaches at Yahoo to the election hacks, history will look back on 2016 as a very instructive year indeed.

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

Survey: Despite costly attacks, 85% of business leaders confident in preparedness

If you’re like most organizations, you think that you’ve got the right controls in place to deal with cyber attacks. But how prepared are you? The results of a recent survey might surprise you.

November 2016: The month in hacks and breaches

November 2016: The month in hacks and breaches

Here's how the holiday season is heating up for hackers.

Who's responsible for data compliance? 25% of executives don't know

Who's responsible for data compliance? 25% of executives don't know

A new survey sheds some light on just how little grasp U.S. organizations have on privacy and security regulations.

3 ingredients of a successful attack

3 ingredients of a successful attack

What we mean when we talk about method, opportunity and motive.

12 steps to lower your espionage risk

12 steps to lower your espionage risk

Corporate espionage is the domain of companies that steal information to gain competitive advantage. Here's how to take the target off your back.

Why senior managers are the most dangerous negligent insiders

Why senior managers are the most dangerous negligent insiders

If you really want to move the needle on data security in your organization, start at the top.

Do you know where your sensitive documents are?

Do you know where your sensitive documents are?

If your employees aren't even aware of what document management tools your organization uses — and that's true for 20% of them, according to a recent survey — you've got some serious policy enforcement issues.

17 tools to protect your online security

17 tools to protect your online security

Ready to get serious about online security? Start with password managers and two-factor authentication.

Crisis planning: 6 ways to put people first

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo.

Investigating Cybersecurity Incidents — a free course

Investigating Cybersecurity Incidents — a free course

Training provider Logical Operations offers a free online course on how to collect, preserve and analyze evidence from cybersecurity incidents — and prepare for the court case.

Download our report: IT Security's Looming Tipping Point

Download our report: IT Security's Looming Tipping Point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The speed of ransomware: 3 seconds to encryption [Infographic]

The speed of ransomware: 3 seconds to encryption [Infographic]

Once you've clicked the phishing email, it's too late.

Election exploits: What you need to know [infographic]

Election exploits: What you need to know [infographic]

In June and August, voter registration databases in Illinois and Arizona were breached. This infographic offers an overview of the breaches, including how the attackers got in and what they stole.

Free course: Responding to Cybersecurity Incidents

Free course: Responding to Cybersecurity Incidents

Training provider Logical Operations, in partnership with IDG Enterprise, offers a free online course to get you up to speed on how to respond to cybersecurity incidents.

Study: More than 50% of SMBs were breached in the past year

Study: More than 50% of SMBs were breached in the past year

"Negligent employees or contractors and third parties caused most data breaches," according to the report. "However, almost one-third of companies in this research could not determine the root cause."

Study reveals security gap in big data projects

Study reveals security gap in big data projects

An IDG Enterprise study of big-data initiatives finds that the extremely valuable output of those projects often lacks additional security. Download the free report.

Your open source security problem is worse than you think

Sixty-seven percent of applications reviewed by Black Duck Software contained known open source security vulnerabilities.

Load More