Quantcast
Channel: CSO Online - Stories by David Strom RSS feed
Browsing latest articles
Browse All 15 View Live

In Pictures: Best tools for protecting passwords

Passwords are a security weak link, but these products help shield passwords from attackers

View Article


In Pictures: How to protect virtual machines (VMs)

These four products represent different approaches to VM security

View Article

Unisys unveils invisibility cloak for network traffic

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance,...

View Article

Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at...

View Article

Email encryption has gotten so much better, so you'd be crazy not to use it

I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting...

View Article


9-vendor authentication roundup: The good, the bad and the ugly

New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.

View Article

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help.

View Article

10 questions to answer before running a capture the flag (CTF) contest

Running your own CTF contest can build security skills and help identify new internal and external talent. Learn what types of challenges you need to include, how to make the contest run smoothly, and...

View Article


What is Mitre's ATT&CK framework? What red teams need to know

The ATT&CK framework allows security researchers and red teams to better understand hacker threats.

View Article


What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become...

View Article

10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

View Article

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them.

View Article

7 Top Tools for Single Sign-on

Okta, OneLogin score high in test of solutions that beef up app security and cut help desk calls.

View Article


Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

View Article

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

View Article

Browsing latest articles
Browse All 15 View Live