CSO Online Interconnecting Business & Cybersecurity

  • BrandPost: A Layered Approach to Cybersecurity: People, Processes, and Technology

    BrandPost: A Layered Approach to Cybersecurity: People, Processes, and Technology

    Cybercrime is an ever-present threat facing organizations of all sizes. In order to safeguard themselves against a successful data breach, IT teams must stay a step ahead of cybercriminals by...

    Read Article
  • BrandPost: Understanding the Attack Chain

    BrandPost: Understanding the Attack Chain

    Today’s security teams are struggling to keep pace with the changes in their networks. Multi-cloud, virtualization, the explosion of IoT and BYOD devices, agile software development, and the...

    Read Article
  • BrandPost: Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects

    BrandPost: Cybersecurity Skills Report: Data Shows What CISOs Look for In Security Architects

    Organizations have placed a significant focus on filling cybersecurity positions, seeking professionals with the right background to address technical security tasks and facilitate the success of...

    Read Article
  • BrandPost: Ready for the Holidays? Cybercriminals are Hoping You’re Not

    BrandPost: Ready for the Holidays? Cybercriminals are Hoping You’re Not

    For most of the world, the holiday season is just around the corner. And in our increasingly connected world, that involves more online activities, from shopping and entertaining to socializing...

    Read Article
  • BrandPost: As Cyber Threats Grow, Cyber Vigilance is Mandatory

    BrandPost: As Cyber Threats Grow, Cyber Vigilance is Mandatory

    In 1809, author Thomas Charlton penned the famous phrase that has been subsequently attributed to a wide variety of people, writing, “the price of liberty is eternal vigilance.” While he certainly...

    Read Article
  • BrandPost: Fill Your Cybersecurity Skills Gap with Veterans

    BrandPost: Fill Your Cybersecurity Skills Gap with Veterans

    One of the most pressing concerns facing organizations today is the widening cybersecurity skills gap. According to recent estimates, there will be as many as 3.5 million unfilled positions in the...

    Read Article
  • BrandPost: The Need for a Unified Security Strategy for Converging IT/OT Environments

    BrandPost: The Need for a Unified Security Strategy for Converging IT/OT Environments

    As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own. The goal is to improve productivity, efficiency, up-time, and...

    Read Article
  • BrandPost: The Role of Artificial Intelligence in IoT and OT Security

    BrandPost: The Role of Artificial Intelligence in IoT and OT Security

    As the modern threat landscape continues to expand, adding artificial intelligence (AI) to a security strategy has become paramount to establishing and maintaining an effective security posture....

    Read Article
  • BrandPost: The Critical Need for a More Secure WAN Solution

    BrandPost: The Critical Need for a More Secure WAN Solution

    Growth in the extension of voice, video, and cloud services to branch offices is prompting many enterprises to embrace SD-WAN as an alternative to their legacy WAN infrastructure solutions. Until...

    Read Article
  • BrandPost: Tips for CISOs to Maintain Privacy and Reduce Risk as the Use of New Technology Increases

    BrandPost: Tips for CISOs to Maintain Privacy and Reduce Risk as the Use of New Technology Increases

    Today’s workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. As new technology emerges, this...

    Read Article
  • BrandPost: Addressing the Modern Threat Landscape with Threat Intelligence Services

    BrandPost: Addressing the Modern Threat Landscape with Threat Intelligence Services

    For your customers, identifying and quickly securing against modern cyberthreats is paramount—especially as they adopt digital transformation strategies to better meet the needs of their...

    Read Article
  • BrandPost: Cyber Scams: Tips to Avoid Being a Victim

    BrandPost: Cyber Scams: Tips to Avoid Being a Victim

    When it comes to protecting yourself and your organization against cyber scams, there’s no “one-size-fits-all” solution. As organizations and people alike continue to adopt new devices and...

    Read Article
  • BrandPost: The Case for Using Use Cases When Selecting an Enterprise Firewall

    BrandPost: The Case for Using Use Cases When Selecting an Enterprise Firewall

    Digital transformation is having a significant impact on networks. Workflows, applications, and transactions need to move freely across today’s distributed network. Mobile users and IoT devices...

    Read Article
  • BrandPost: Basic Cyber Hygiene Practices That Go a Long Way

    BrandPost: Basic Cyber Hygiene Practices That Go a Long Way

    When on the job at a corporate office, a healthcare organization, or an academic institution or government agency, or even when you are working from a local coffeshop, restaurant, or home office,...

    Read Article
  • BrandPost: Securing the Multi-Cloud: 3 Steps for Maintaining Control and Visibility

    BrandPost: Securing the Multi-Cloud: 3 Steps for Maintaining Control and Visibility

    A hybrid, multi-cloud environment offers the advantages of high resiliency combined with the agility to adapt quickly to changing digital business requirements. In one recent analysis, 86% of...

    Read Article
  • BrandPost: Cybercriminals Shift Tactics to Keep a Low Profile

    BrandPost: Cybercriminals Shift Tactics to Keep a Low Profile

    Over the past several years, cyberattacks have become more targeted and sophisticated. Cybercriminals have begun to augment their attacks with advanced technologies, such as machine learning and...

    Read Article
  • BrandPost: Cybersecurity Skills Report: Today’s CISO is Shifting Toward Strategic Business Enablement

    BrandPost: Cybersecurity Skills Report: Today’s CISO is Shifting Toward Strategic Business Enablement

    Businesses and government agencies of all sizes are experiencing cyber attacks that are growing in both frequency and complexity. Cybercriminals, nation-states, and a host of other bad actors are...

    Read Article
  • BrandPost: Unidentified Devices Leave Networks Vulnerable

    BrandPost: Unidentified Devices Leave Networks Vulnerable

    As organizations embrace digital transformation to improve operational efficiency, IoT devices—including industrial and medical IoT—are being deployed at an unprecedented rate. This rapid adoption...

    Read Article
  • BrandPost: The Evolving Threat Landscape - Swarmbots, Hivenets, Automation in Malware

    BrandPost: The Evolving Threat Landscape - Swarmbots, Hivenets, Automation in Malware

    Over the past several months, the FortiGuard Labs team has been tracking a number of evolving trends related to the FortiGuard 2018 Threat Landscape Predictions article published just before the...

    Read Article
  • BrandPost: Fireside Chat with School District of Philadelphia: Securing Virtual Servers,  Chromebooks, and Student Data

    BrandPost: Fireside Chat with School District of Philadelphia: Securing Virtual Servers, Chromebooks, and Student Data

    The School District of Philadelphia is the eighth-largest public school district in the United States, with more than 134,000 students and more than 18,000 staff. “Although we’re large, we are an...

    Read Article
  • loading
    Loading More...