Latest articles for CSO magazine

dummy-img

Data explosion offers challenges, opportunities to security pros

Jul 17, 2015

230 million patients. 3,300 hospitals. 900,000 healthcare professionals. 98 percent of U.S. pharmacies. More than 700 different electronic health record platforms. 764 million medication histories.…

dummy-img

Regulators seek to limit security software exports

Jul 16, 2015

The comment period on a proposed set of software export restrictions ends next Monday, and the rules, as written, would severely restrict international sales, deployment,…

dummy-img

Electronic Frontier Foundation celebrates 25 years of defending online privacy

Jul 16, 2015

The Electronic Frontier Foundation is the digital world’s top watchdog when it comes to privacy and free expression. But while cops and firefighters are often…

dummy-img

Report: Malvertisers now using SSL redirects

Jul 15, 2015

Advertising networks have gotten better at spotting malicious downloads embedded into advertisements, so criminals began using redirects, even chains of a dozen redirects or more,…

dummy-img

‘Butterfly’ group goes after corporate IP

Jul 14, 2015

Symantec has identified a group of cybercriminals, whom they’ve named “Butterfly,” as targeting corporate intellectual property for financial gains, with Twitter, Facebook, Apple and Microsoft…

dummy-img

Malvertising reaches record levels in June

Jul 14, 2015

Malvertising campaigns have reached more users than ever before, reported security firm Invincea yesterday, with many brand-name websites affected — including CBS Sports, Yahoo and…

dummy-img

Top global security experts defend encryption

Jul 10, 2015

As government officials continue to plea the case against strong encryption, a group of high-profile international security experts have published a paper arguing that allowing…

dummy-img

Despite warnings, majority of firms still run some Windows Server 2003

Jul 9, 2015

Enterprises are still heavily dependent on Windows Server 2003 even though there were plenty of warnings that support is coming to an end on July…

dummy-img

IEEE group recommends random MAC addresses for Wi-Fi security

Jul 8, 2015

According to new recommendations by an IEEE study group, the Wi-Fi protocol needs to be updated to use randomly generated addresses for better security and…

dummy-img

Scammers bypass Google filters with PDF cloaking

Jul 7, 2015

Scammers have long used cloaking as a technique to drive up search engine rankings, stuffing webpages full of keywords and links that make them attractive…

dummy-img

Report: Every company is compromised, but most infections not yet at critical stage

Jul 1, 2015

In a recent analysis of a quarter million endpoint devices in 40 enterprises, every single corporate network showed evidence of a targeted intrusion but most…

dummy-img

Agencies need to pay more attention to supply chain security

Jun 30, 2015

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result, says a security rating expert.According to a…

dummy-img

Who’s winning the mobile payments war?

Jun 29, 2015

Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…

dummy-img

5 non-traditional hiring tips for InfoSec

Oct 21, 2014

There’s a dramatic shortage of qualified information security professionals in the industry today. Globally, we’re a million people short, according to Cisco’s 2014 Annual Security…

dummy-img

Tools catch security holes in open source code

Jul 1, 2014

This year has been the best of times and the worst of times for open source code and security. On the one hand, the latest…

10 tips to attract women to infosec jobs

10 tips to attract women to infosec jobs

May 5, 2014

Women make up  just 11 percent of information security professionals.  Just increasing that number to 22 percent would solve the industry’s staffing shortage problem. Unfortunately,…

How to get creative with your penetration testing

How to get creative with your penetration testing

Apr 24, 2014

  While there are plenty of standardized methods for penetration testing that we’re all familiar with, the bad guys aren’t sticking to traditional methods for…

You Need to Get Creative With Pen Testing. Here’s How to Do It.

You Need to Get Creative With Pen Testing. Here’s How to Do It.

Apr 16, 2014

Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common…

Forgotten risks hide in legacy systems

Forgotten risks hide in legacy systems

Apr 3, 2014

Cover story These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that…

dummy-img

Info sec industry still struggles to attract women

Mar 25, 2014

Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has…

dummy-img

10 reasons to take a Chromebook on the road

Oct 21, 2013

If you’re trying to decide which device to buy for your next trip because your current laptop is too old, too slow, too heavy and…

dummy-img

SaaS vendors, customers, finding new ways to secure the cloud

Oct 15, 2013

Rogue employees, hackers, government employees all threats to keeping information stored on the cloud private Edward Snowden’s leaks about NSA spying may have brought the…

dummy-img

Bitcoin: Seven reasons to be wary

Jul 23, 2012

Of all the virtual currencies out there, BitCoin is the most interesting from a technical perspective – and the least interesting from the business point…

dummy-img

How to Survive a Cloud Outage

Jul 11, 2011

Amazon’s infamous cloud outage in April brought down a number of popular Web sites, including foursquare and Reddit – but many of Amazon’s enterprise cloud…

dummy-img

Five iPad Safety Tips

Feb 14, 2011

1. Encrypt, encrypt, encrypt. There are two parts to the data encryption challenge – encrypting stored data, and encrypting data that’s moving over public networks,…