CSO

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is a recap of what the cyber kill chain approach

What is the cyber kill chain? Why it's not always the right approach to cyber attacks Read More »

Why even the best antivirus software isn't enough (and why you still need it)

Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise, experts say, as part of a multi-layer endpoint security protection strategy. The best antivirus products act as the first layer of defense, stopping the vast majority of malware attacks and

Why even the best antivirus software isn't enough (and why you still need it) Read More »

7 best practices for working with cybersecurity startups

Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and can often offer more personalized service at a more attractive price. Atiq Raza has seen this from both sides. Today, he’s the CEO of Silicon Valley cybersecurity startup Virsec Systems, but he’s also worked for

7 best practices for working with cybersecurity startups Read More »

Corporate pre-crime: The ethics of using AI to identify future insider threats

To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors. With artificial intelligence (AI) and machine learning, this data can also be used to make predictions. Is an employee planning to steal data? To defraud the company? To engage in insider trading? To sexually harass another employee?

Corporate pre-crime: The ethics of using AI to identify future insider threats Read More »

3 reasons companies fail to assess the scope of a data breach

First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first time around. Then another announcement, with another upward correction. With each new revelation, the hacked organization loses credibility and faces greater liability. To read this article in full, please click

3 reasons companies fail to assess the scope of a data breach Read More »