Videos
CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
Tech leaders face mounting uncertainties in cybersecurity and Generative AI. This panel session offers vital insights for tech leaders to protect their organizational data. Drawing upon real-world experiences and industry expertise, our panelists wil...
Recently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations a...
VPNs are a remote work staple, but they’re hardly the most secure way to access corporate data. CSO Online’s UK Editor, Michael Hill, joins Juliet to explain why overreliance on VPNs poses a security risk, and what alternatives enterprises should...
The new Microsoft Defender for Business makes important Windows security features more available to small businesses.
CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean for organizations.
XDR is one of security's buzziest acronyms—and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security...
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud...
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. CISO Omar Khawaja...
Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to tran...
With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if the...
A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.
Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization mu...
SMBs typically outsource some or all their IT services to an MSP. Here’s how to find one that takes security seriously.
Most businesses will have some PCs that they can’t update to Windows 11. Here’s how to keep those PCs from being a security weak link.
With more than 70,000 employees, BD is one of the largest global medical technology companies in the world and is advancing the world of health by improving medical discovery, diagnostics and the delivery of care. At BD, security spans a spectrum fro...
Understand these basic elements of computer forensics before you have to review log data for suspicious activity.
The new MITRE D3FEND knowledge graph of cybersecurity countermeasures offers solid guidance for Windows admins.
Here’s what your systems need before you can take advantage of Windows 11’s security features, and how to upgrade where possible.