Quantcast
Channel: CSO Online - Stories by Bob Violino RSS feed
Browsing latest articles
Browse All 45 View Live

IoT pushes IT security to the brink

The Internet of Things (IoT) offers many possible benefits for organizations and consumers—with unprecedented connectivity of countless products, appliances and assets that can share all sorts of...

View Article



Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new...

View Article

Mergers create greater security risk

Security risks, both cyber and physical, certainly belong on the list of concerns. And with the ongoing shortage of professionals who are expert in various aspects of data protection—coupled with the...

View Article

Robots present a cyber risk

The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all...

View Article

Dyn attack highlights 2016 security woes

This has been another eventful year in the realm of cyber security—with a number of high-profile data breaches that affected large numbers of people and technological developments that promise to...

View Article


Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other...

View Article

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

View Article

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

View Article


10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

View Article


Guide to the top college and university cyber security degree programs

CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place...

View Article

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

View Article

Five things you need to know about executive protection

Protecting executives today is about much more than physically shielding them from danger.

View Article

5 missteps that could cost CISOs their jobs

Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

View Article


Safeguarding your biggest cybersecurity target: Executives

Top execs make big targets, especially when traveling abroad. Here’s how to protect C-level officers from whaling, espionage, and themselves.

View Article

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

View Article

Browsing latest articles
Browse All 45 View Live




Latest Images