Breaking and protecting devops tool chains

Ken Johnson, CTO of nVisium, and Chris Gates, Senior Security Engineer at Uber talk to CSO Online's Steve Ragan about working with devops tool chains.

Free tools for your cyber-security efforts

There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. While many are trial ware-based enticements designed to lure decision...

Want privacy? Congress says you'll have to pay for it

When this week, it threw data security under the bus as well. Internet users who want to protect their data can expect to pay a "privacy tax" as a...

Ransomware 'customer support' chat reveals criminals' ruthlessness

Ransomware criminals chatting up victims, offering to delay deadlines, showing how to obtain Bitcoin, dispensing the kind of customer support that consumers lust for from their cable and mobile plan...

Hacking the 2016 election: A timeline

History has yet to judge the 2016 presidential election, but from where we sit in the early days of 2017, it’s hard to imagine that it will ever be relegated...

Ransomware disrupts Washington DC's CCTV system

About 70 percent of the cameras hooked up to the police’s closed-circuit TV (CCTV) system in Washington, D.C., were reportedly unable to record footage for several days before President Trump’s...

Security expert: Ransomware took in $1 billion in 2016

Increased user awareness of , better antivirus technology, more industry-wide information sharing and cross-border efforts by law enforcement authorities will combine to turn the tide against...

Trump stresses cybersecurity but postpones executive order

U.S. President Donald Trump called on government agencies to better protect their networks, but he delayed signing an executive order to kick-start a government-wide review of cybersecurity policy.A , leaked earlier, would...

IDG Contributor Network: What's all the chatter about chatbots

We’re hearing more and more about chatbots in the enterprise starting to gain adoption as customer service agents these days. There are two major approaches to chatbots prevalently discussed in AI...

Bringing behavioral game theory to security defenses

CSO Online | Jul 26, 2017 Kelly Shortridge and CSO senior writer Fahmida Y Rashid talk about using behavioral game theory to take advantage of hackers’ mistakes and manipulate the data...

STAY CONNECTED

2,973,060FollowersFollow
13,460,346FollowersFollow
6,540SubscribersSubscribe