CSO staff

Data destruction 101: There's more to it than wiping your drive [Infographic]
Tip

Data destruction 101: There's more to it than wiping your drive [Infographic]

What you need to know about preparing hard drives for reuse, recycling, and disposal.

Survey: The state of encryption is strong, but mind the gaps

Survey: The state of encryption is strong, but mind the gaps

Companies lag in protecting employee information, mobile devices.

Sample computer and e-mail usage policy
Tip

Sample computer and e-mail usage policy

A one-page computer and email usage policy of a manufacturing company with fewer than 50 employees. Covers unauthorized access, software licenses, harassment and pornography issues; establishes right to monitor.

Sample password protection policy
Tip

Sample password protection policy

The password protection policy of a large financial services institution with more than 5,000 employees.

Black Friday to Cyber Monday: Mobile commerce up, fraud (mostly) down

Black Friday to Cyber Monday: Mobile commerce up, fraud (mostly) down

Credit card fraud, identity theft and friendly chargebacks were the top types of online fraud during the 4-day online shopping bonanza.

10 tips to make sure you are ready when a disaster strikes

10 tips to make sure you are ready when a disaster strikes

BIAImage by SVIDSHUBStart with a business impact analysis (BIA). This will identify the business's most crucial systems and processes and the effect an outage would have on the business. The greater the potential impact, the more...

IT pros turn a blind eye to file sharing practices, report says

IT pros turn a blind eye to file sharing practices, report says

Sixty-one percent have shared files through unencrypted email accounts.

IT pros turn a blind eye to file sharing practices, report says

IT pros turn a blind eye to file sharing practices, report says

Sixty-one percent have shared files through unencrypted email accounts.

6 ways to stop criminal attackers in their tracks

6 ways to stop criminal attackers in their tracks

Halting attacksImage by ShutterstockIn the wake of a string of high-profile data breaches such as Dairy Queen, JP Morgan Chase, AT&T and Home Depot, enterprises need to be ever vigilant to fend off bad actors. Exabeam offers tips...

15 of the scariest things hacked

15 of the scariest things hacked

From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.

Top 6 threats to iOS devices

Top 6 threats to iOS devices

Stay vigilantGiven the recent iOS update and iPhone announcement, Lacoon Mobile Security has released the top threats you should be aware of to your iOS devices. iOS Surveillance and Mobile Remote Access Trojans (mRATs)Image by...

13 steps through a data breach

13 steps through a data breach

Here is what an organization should do after a security breach occurs.

14 tips to secure cloud applications

14 tips to secure cloud applications

Enterprises are now clamoring for the corporate security gateway to give way to the new cloud application security gateway.

How horror movies can imitate real-life scenarios for CSOs

How horror movies can imitate real-life scenarios for CSOs

These plot lines will strike fear into the heart of today's tech professionals.

CSO's Ultimate Guide to Social Engineering

Social engineering attacks security at its weakest link: People. Preying on employees' best intentions, social engineers gain unauthorized access to systems and information.

68 great ideas for running a security department

Looking for inspiration? Want to learn a few new ways to elevate your security game? Can you spare five minutes to think strategically and long-term instead of just putting out another fire? Insider (registration required)

The security data and survey directory

Survey statistics and research studies are a great way to help you recognize impending threats and emerging attack vectors. Data can even help you identify and substantiate the need for specific budgetary increases to the C-suite. So...

The security data and survey directory

Security data. Everybody needs it. Lots of companies and organizations are producing it. Here's where to find it.

Security laws, regulations and guidelines directory

This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who...

Security laws, regulations and guidelines directory

This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who...

Load More