Open source

CISO movements, new appointments and exits at India's top enterprise IT companies

CSO Online brings to you the comprehensive list of CISO/CSO movements and new appointments in the cybersecurity space.

Partner Content
Blockchain Security: 3 Ways to Secure Your Blockchain

From just another buzzword a few years back, to one of the most pursued technologies across the globe, Blockchain has come a long way. And it is here to stay. 

Technical debt can slow IT to a crawl: Dr. Bill Curtis, Cast Software

Businesses today are facing extremely expensive glitches owing to accumulated technical debt across global IT systems, says Dr. Bill Curtis, Chief Scientist at Cast Software and Director of the Consortium for IT Software Quality (CISQ).

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent.

The world’s two largest enterprise blockchain groups join forces

Hyperledger and the Enterprise Ethereum Alliance are teaming up to promote blockchain technology to companies and to collaborate on development efforts.

Secrets of 'shift left' success

The shift left movement is about bringing security into the software development cycle earlier through DevSecOps and other changes, yielding more secure software more quickly and at lower costs.

Why you should consider crowdsourcing IT security services

Whether you need a pentesting team, a bug bounty program, or a vulnerability disclosure plan, several crowdsourcing platforms can take the risk and pain from the process.

Software security: There’s more to it than bug-bounty programs

Take full advantage of white-hat hackers to help you secure your code. And still do all the other security stuff you should do before you release your code

What can organisations learn from hackers? Inside Nuix's Black Report

Despite all the noise from security vendors, most hackers and pentesters can worm into a network and exfiltrate valuable data in under a day, including for critical systems, according to a recent report from Nuix.

Security alert: Hackers shift focus from ransomware to cryptojacking

Hackers have been increasingly moving towards cryptojacking attackshijacking computing resources and using that to mine cryptocurrency.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.