What’s the best way to avoid Android malware? Downloading all your apps from the Google Play store -- where software is vetted – is perhaps the best advice. But that doesn’t mean Google Play is perfect.
Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions
Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are
Many organizations are facing a reality where their security investments have been focused on-prem but their users, devices, or apps are moving off-prem. A common question we hear from CISOs is: "How do we determine when it's time to
Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.
Gain actionable insights on how to defend your websites and APIs for the coming year's onslaught of automated threats. Join the conversation with EMA and Distil Networks as they dive into the latest Distil Networks Bad Bot Report data
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding...
Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...