Latest articles for CSO magazine

dummy-img

7 ways 5G mobile networks will change IoT security, and how to prepare

Oct 7, 2019

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.

dummy-img

Business email compromise attacks cost millions, losses doubling each year

Oct 1, 2019

Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC…

dummy-img

Rich PII enables sophisticated impersonation attacks

Sep 24, 2019

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account…

dummy-img

How secure are your AI and machine learning projects?

Sep 2, 2019

When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…

dummy-img

6 ways cybercriminals use commercial infrastructure

Aug 26, 2019

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.

dummy-img

6 API security lessons from the Venmo breach

Jul 30, 2019

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to…

dummy-img

How to close SIEM visibility gaps created by legacy apps

Jul 16, 2019

It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options…

dummy-img

4 security concerns for low-code and no-code development

Jun 24, 2019

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide…

dummy-img

6 ways malware can bypass endpoint protection

Jun 10, 2019

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here’s how attackers do it.

dummy-img

How First Citrus Bank got rid of employee passwords

Jun 4, 2019

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones.

dummy-img

What is GPS spoofing? And how you can defend against it

May 7, 2019

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here’s…

dummy-img

Google expands cloud security capabilities, including simpler configuration

Apr 10, 2019

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their…

dummy-img

What is AI fuzzing? And why it may be the next big cybersecurity threat

Mar 26, 2019

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and…

What is quantum cryptography? It’s no silver bullet, but could improve security

What is quantum cryptography? It’s no silver bullet, but could improve security

Mar 12, 2019

In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just…

dummy-img

What is biometrics? And why collecting biometric data is risky

Feb 12, 2019

Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric…

dummy-img

How security operations centers are adapting to the cloud era

Jan 2, 2019

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here’s how the industry and business are finding new ways to collect, monitor…

8 old technologies that still play roles in security

8 old technologies that still play roles in security

Dec 10, 2018

Newer isn’t always better, at least where cybersecurity is concerned. For some applications, these older technologies are still effective ways to protect data and systems.

dummy-img

Best antivirus software: 14 top tools

Dec 6, 2018

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

dummy-img

DDoS protection, mitigation and defense: 8 essential tips

Nov 27, 2018

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

dummy-img

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

Nov 15, 2018

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…

dummy-img

Why the best antivirus software isn’t enough (and why you still need it)

Oct 29, 2018

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

dummy-img

Why even the best antivirus software isn't enough (and why you still need it)

Oct 29, 2018

Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise,…

dummy-img

Best antivirus software: 13 top tools

Oct 11, 2018

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability.

dummy-img

What is enterprise risk management? How to put cybersecurity threats into a business context

Oct 11, 2018

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

dummy-img

7 best practices for working with cybersecurity startups

Oct 9, 2018

Cybersecurity startups, not weighed down by legacy platforms, can be more nimble and innovative than their more established competitors, and can often offer more personalized…

dummy-img

4 top challenges to a secure digital transformation

Sep 12, 2018

Improving cybersecurity is becoming a driving factor for starting digital transformation projects. Mistakes in implementation, however, can be costly.

dummy-img

What are next generation firewalls? How the cloud and complexity affect them

Aug 27, 2018

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in…

dummy-img

Corporate pre-crime: The ethics of using AI to identify future insider threats

Aug 20, 2018

To protect corporate networks against malware, data exfiltration and other threats, security departments have systems in place to monitor email traffic, URLs and employee behaviors.…

dummy-img

3 reasons companies fail to assess the scope of a data breach

Aug 13, 2018

First comes the embarrassing breach announcement. Then, a few days or weeks later, another one — a few million stolen records were missed the first…

dummy-img

California Consumer Privacy Act: What you need to know to be compliant

Jul 30, 2018

California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.