CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 31, 2022

Data capture by border agencies can and will happen – are your on-the-road employees prepared?

Many countries routinely download device content from travelers at the border. Getting ahead of this eventuality can help protect sensitive data and maintain privacy for employees and their company. Read more ▶

Image: Sponsored by Dell Technologies: Build your next breakthrough

Sponsored by Dell Technologies: Build your next breakthrough

Growing mid-sized companies are challenged to keep big-picture objectives front and center. Discover ways to improve your IT infrastructure, boost operational efficiency and be ready to grow your business.

Phishing attacks increase by over 31% in third quarter: Report

Cybersecurity company Vade reports that attackers sent more than 203.9 million emails in the third quarter alone, up from 155.3 million in the prior quarter

Information overload, burnout, talent retention impacting SOC performance

Security operations center leaders and staff report numerous pain points impacting SOC performance.

Image: One-Day, 3-City Networking Tour for IT & Security Pros

One-Day, 3-City Networking Tour for IT & Security Pros

[Coming to a City Near You] Stop thinking in silos and register for CIO & CISO Perspectives. Join IT and security experts in-person this November to explore new strategies and technology solutions and build a unique competitive advantage. Register now.

What the Uber verdict means to CISOs: You're (probably) not going to jail

CISOs and potential CISOs worried about criminal risk won't go to jail if they follow four simple steps.

Top skill-building resources and advice for CISOs

Security leaders from around the world tell how they built their careers and share the resources and certifications that brought them success.

How to update your Windows driver blocklist to keep malicious drivers away

An investigation revealed that Microsoft’s malicious driver blocklist wasn’t updating as expected. Here’s how to make sure you’re not letting bad actors gain access to your system through these carefully crafted attack tools.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494