CSOs must adopt new risk management trends
Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …
The SCADA security challenge
One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …
How CSOs are enabling secure BYOD
Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …
Privacy tips for social networking, apps and geolocation
Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …
HD Moore: The wild west
HD Moore is the CSO of Rapid7 and Chief Architect of Metasploit. In the video below, recorded at Derbycon last week in Kentucky, he talks about ghost towns, highways, and …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Removing risk from network and security change management
“There is nothing wrong with change, if it’s in the right direction,” said Winston Churchill. But speak to a hard-pressed CSO or CIO, and they’ll tell …
Interview with Joe Sullivan, CSO at Facebook
Joe Sullivan is the Chief Security Officer at Facebook, where he manages a small part of a company-wide effort to ensure a safe internet experience for Facebook users. He and …
Featured news
Resources
Don't miss
- Digital sovereignty becomes a matter of resilience for Europe
- Storm-2603 spotted deploying ransomware on exploited SharePoint servers
- CISO New York 2025 brings together top cybersecurity leaders
- Sonicwall fixes critical flaw in SMA appliances, urges customers to check for compromise (CVE-2025-40599)
- Autoswagger: Open-source tool to expose hidden API authorization flaws