CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

August 13, 2020

4 best practices to avoid vulnerabilities in open-source code

Open-source code in public repositories might contain malware or unintentional vulnerabilities. Here's how to best manage finding and mitigating potential problems. Read more ▶

Image: Sponsored by Code 42 Software: Attend the first of its kind Insider Risk Summit on Sept 17th, 2020

Sponsored by Code 42 Software: Attend the first of its kind Insider Risk Summit on Sept 17th, 2020

The virtual event that goes beyond the problem: Where the security community connects to address the growing data risks from insider threats from a decentralized workforce. Learn more.

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk.

The state of security hiring: Jobs, skills & salaries

Even in today's tough job market, demand for security pros remains high. We look at the hottest industries and markets for cyber security jobs — and what it will take to land a one of these top jobs.

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better aligned risk management.

10 security changes post-COVID-19

CISOs must anticipate burgeoning needs for distributed security scale, intelligence, and self-service.

How to minimize the risks of split tunnel VPNs

Split tunnel virtual private networks have some advantages for supporting remote workers connecting to a Windows network, but they come with risks. Here's how to best protect your network.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701