CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

February 09, 2021

5 ways attackers counter incident response, and how to stop them

IR has become a chess match with attackers who can cleverly spoil responders' efforts and keep a foothold in systems. Here's how they do it and how to kick them out for good. Read more ▶

Image: Sponsored by LogMeIn: From Passwords to Passwordless

Sponsored by LogMeIn: From Passwords to Passwordless

LogMeIn recently partnered with market research specialist Vanson Bourne to explore the trends driving towards a passwordless future. Download the report From Passwords to Passwordless to explore the benefits of passwordless authentication and perceived challenges.

How strong, flexible data protection controls can help maintain regulatory compliance

An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

12 security career-killers (and how to avoid them)

Don't let these missteps hamper your professional ambitions.

Image: 6 top security technologies to protect remote workers

6 top security technologies to protect remote workers

Zero trust, SASE, and identity management are just some of the technologies companies are deploying to secure home-based workers, systems, and data.

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

3 ways to speak the board's language around cyber risk

Framing the cyber risk conversation in ways that resonate with the board will help close the chasm between cyber risk and enterprise objectives.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
492 Old Connecticut Path
Framingham, MA 01701