Security

Security | News, how-tos, features, reviews, and videos

Rendering of Cyber Security Center in Augusta Georgia, courtesy of Georgia Technology Authority.

Unique collaboration turned a governor’s vision of a cyber center into reality

Interviewing the State of George's CIO Calvin Rhodes, who helped lead a collaboration of government, academia, the military and the private sector to create a new cyber ecosystem.

security group team circuitry

Lack of C-suite collaboration hampering cybersecurity, report finds

As cyber-attacks grow in frequency, chief information security officers and C-suite executives must work more closely together.

The U.S. Capitol building in Washington

GSA’s entity validation request for proposal is flawed

The plan to create a government-run identifier raises intellectual property concerns and duplicates private sector efforts.

aerial view of pentagon government security dv1282020

Pentagon CIOs struggle with legacy tech, security. Sound familiar?

Defense Department tech chiefs working to modernize sprawling IT infrastructure encounter similar hurdles — if on a larger scale — as CIOs in other agencies and the private sector.

phishing hacker binary keyboard privacy security breach

What exactly is a privacy risk?

Without knowing what privacy risks are, businesses and consumers would be left in the dark under new privacy law proposals.

businessman stranded on an outcropping of rock in the ocean, surrounded by sharks

Top 10 GRC mistakes — and how to avoid them

A sound governance, risk and compliance (GRC) strategy is more valuable — and harder to hone — than you might think. Here’s how to avoid looming disaster.

3 legal law books

New privacy laws must permit valuable uses of public records

Let’s be careful not to shortchange the free flow of public data in the rush to pass new privacy.

board ceo executives table

CIOs engage in a cat-and-mouse struggle to secure company communications

Every company has a vested interest in protecting sensitive data. CIOs can reduce the risk of phishing attacks and other exploits by deploying cloud-based communication monitoring software that leverages both internal and external...

1 network internet connected grid earth power satellite view

Can the internet crash? How the unthinkable could happen

If the dark day comes when the internet does experience a global crash, the thing that takes it down will be, almost by definition, the thing we didn't see coming.

11 sharing

Data sharing: a problematic idea in search of a problem to solve

Proposals to require companies to share their data are riddled with flaws and solve no pressing marketplace defects.

USA / United States of America / American flag

It’s time for a uniform national privacy law

In light of new laws from Europe and California privacy needs to be on the Congressional agenda.

8 authentication basics password identity protected security

Sheltered Harbor ensures cyber resilience for financial services firms

After the infamous Sony Pictures hack in 2014, the financial services industry came together to develop Sheltered Harbor to ensure customer financial data would remain secure and accessible in the event of a cyberattack.

data analytics - statistical analysis - charts, graphs, strategy planning

Sprint calls on open source analytics to prevent cyberfraud

Sprint’s open source Elastic Stack analytics implementation helped the mobile device and network provider reduce mobile phone fraud by 90 percent.

hacker

Online manipulation is the latest data protection debate

The furor over “dark patterns” reveals the limits of consumer control as the primary tool of data protection.

credit card

Ohio v. American Express is sensible antitrust policy

Supreme Court’s Ohio v. American Express decision is more sensible in how it handles antitrust policy than some realize.

lock, chain, blocks and binary code

How blockchain is impacting information security in companies

Blockchain has the ability to impact and disrupt multiple business sectors; and as hacking, phishing and security threats are becoming more prominent, companies are turning to groundbreaking technologies to protect not only their...

security breach egg reveal locks binary code hacked

CIOs reveal their security philosophies

Global IT leaders describe their approaches to cybersecurity application and communication.

Facade of government court building

The challenges and perils of intermediary liability

Companies generate controversy when they don’t moderate content – but even when they do.

lawsuit judge law court decision sued

A new patent myth in Washington

A flawed study prompts developments in Congress and the Patent and Trademark Office that threaten progress made against trolls.

Bob Bragdon

Where is Zero Trust today?

Sponsored by Centrify -- Bob Bragdon, Publisher of CSO, gives his impressions of the status of Zero Trust Security and where enterprises stand in their adoption of the model today.

Load More