Quantcast
Channel: CSO Online - Stories by Kacy Zurkus RSS feed
Browsing all 15 articles
Browse latest View live

Are Apple-specific threats on the rise?

Macs are really no more secure than a PC, but for many years there just weren’t as many out there because of the expense of the hardware and other issues. They've historically been a much less popular...

View Article



What company execs can learn from Trump’s tweeting

Being judicious about social media use and staying away from WiFi protects executives and the enterprise.

View Article

Rise of as-a-service lowers bar for cybercriminals

Widespread availability of RaaS and botnet rentals for DDoS attacks make it easy for those without technical skills to enter into cyber crime

View Article

What's the value in attack attribution?

Does attack attribution and knowing your adversaries really matter when it comes to securing the enterprise?

View Article

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to...

View Article


Despite the gender barriers, women must persist in cyber

Overcoming obstacles that challenge women from entering and staying in the security industry

View Article

SDN solves a lot of network problems, but security isn't one of them

As the digital enterprise struggles to find the best security solutions to defend their ever-expanding networks, many are looking to next generation tools that offer interoperability capabilities.

View Article

Prevent or detect? What to do about vulnerabilities

A good security program includes prevention, detection, and response, so security practitioners need to focus on the vulnerabilities that matter.

View Article


Antivirus headaches that compromise browser security

Why web browsers leave security engineers constantly playing defense.

View Article


Are we ready to bid the SIEM farewell?

SIEM technology is old, and possibly not properly configured making it vulnerable to attacks.

View Article

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.

View Article

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization.

View Article

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

View Article


Be wary of vendors touting superior data science

Security vendors are jumping on the data science, machine learning, AI bandwagon, but don't believe the hype. Here's how to make sure the vendor you're evaluating can make good on its promises of data...

View Article

CEOs' risky behaviors compromise security

If shadow IT is a problem with business decision makers, that may be a sign your senior security person isn't engaged at a high enough level.

View Article

Browsing all 15 articles
Browse latest View live


Latest Images