Quantcast
Channel: CSOONLINE.com - In Depth
Browsing latest articles
Browse All 148 View Live

RSAC 2014: Experts discuss the harsh realities of Incident Response

How well is incident response working for corporations effected by security incidents? A panel at RSA says there is still a lot of work to be done

View Article



Even Apple and Google can't protect users from inherent mobile app risks

It's no secret that users have to give up private information to use mobile apps. But given that attacks on mobile devices are on the rise, should they?

View Article

Why you need to segment your network for security

Pen tester Mark Wolfgang argues segmenting for security is a key piece of an overall defense-in-depth strategy. Here he explains why and how to accomplish it in your organization (registration required)

View Article

CryptoLocker's success will fuel future copycats

Ransomware with unbreakable encryption will attract cyber bandits like flies to offal

View Article

Box, Dropbox, or drop both?

Box and Dropbox are both popular solutions for cloud-based file sharing, but do they meet enterprise security standards?

View Article


A clear-eyed guide to Mac OS's actual security risks

Apple has improved its security in recent years, but is it enough?

View Article

The cost of doing business at the RSA Conference

As attendance at the yearly conference rises, so do the costs of space on the expo floor, creating a debacle for smaller companies

View Article

Big Data still 'a new frontier' for most of the public sector

NSA surveillance technology is cutting edge, but for most of the government, Big Data analytics is a promise unfulfilled

View Article


Malicious advertising offers broad reach and quick rewards for malware...

Dynamic, expanding advertising scene opening juicy targets for Internet bandits

View Article


Without proper security measures, smart homes are just begging to be targets

As they stand now, smart devices are exceedingly vulnerable to attack, and it's up to users to keep them from becoming a front door to their entire networks

View Article

Can data lakes solve cloud security challenges?

What is a "data lake?" And can enterprises use differing data lakes to address cloud security concerns?

View Article

Healthcare.gov: Proceed at your own risk

The government insists the Obamacare site is secure. But most experts disagree

View Article

Teen cyberbullying grows with 'anonymous' social chat apps

Apps like Yik Yak, Whisper and Secret offer teens online anonymity, but experts say parents need to remind kids that the promise is bogus

View Article


HOCO CISO program breaking ground with "virtual" CISOs

Program in Howard County, Maryland is making waves by providing security counsel to those who otherwise couldn't afford it

View Article

Info sec industry still struggles to attract women

Many barriers still stop women from considering info sec as a profession. But both companies and women would benefit in an increase in the numbers, and many firms are now stepping up efforts to recruit...

View Article

Browsing latest articles
Browse All 148 View Live




Latest Images