From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.
Stories by CSO staff
The IRS breach revealed last week will be Topic No. 1 at a hearing today before the U.S. Senate Finance Committee, and agency officials are expected to place the blame for the data leak on lawmaker-driven cutbacks in funding.
The depths a phishing scammer will stoop to in order to gain a buck are remarkable. Here are some of the bottom feeders to guard against in your inbox.
From televisions to passenger planes, even the most unassuming device can, if accessed by the wrong people, be turned into something more sinister.
Enterprises are now clamoring for the corporate security gateway to give way to the new Cloud application security gateway.
The Internet creates a wealth of economic opportunities--for corporations and criminals alike. Taking "know thy enemy" as our mantra, Debriefing spoke with a young Asian hacker who easily penetrated the databases of several large U.S.-based corporations, and whose exploits made him a top priority of the U.S. Federal Bureau of Investigation. His advice for dealing with foreign cybercriminals sounds strikingly like the hacker's own MO: Knowing what makes your antagonist tick is the key to getting the result you want.
Dan Lohrmann, CISO of Michigan, answers readers' questions about cybersecurity.