Opinion News, Features, and Interviews


How to ace the CISO interview – be ready for the tough questions

Getting a top job in information security has never been as simple as just having the required training and experience. Yes, those are mandatory, but the modern hiring process also includes personality evaluations to determine the so-called “XQ” – whether a candidate would be a good “fit” for a position – background checks and yes, the personal interview.

Taylor Armerding | 06 Oct | Read more

How to explain cyber security to your board

If you're like most, you face a conflicting challenge around security: while there is increased focus on digitalisation of the business, at the same time the threats to the business have not been fully addressed – or even planned for.

David Gee | 02 Jun | Read more

More Opinion news


Why your information security stinks & what to do

Amit Yoran was the Department of Homeland Security's first director of the National Cyber Security Division of the Information Analysis and Infrastructure Protection office. But by September 2004 he was frustrated by what he saw as a lack of concern and commitment to Internet security. So he quit his post.

Bill Brenner | 22 Apr | Read more

IT Advocate: The privacy minefield

There are significant differences between state and federal privacy legislation. CIOs who deal with government agencies or other public sector organisations must determine the privacy laws applicable to them – and how best to accommodate them.

Emma Weedon | 15 Sep | Read more

Five mistakes security pros would make again

Ten years ago, Michael Riva was network administrator for a top-five American consultancy. Employees were downloading graphic pictures and videos onto the network. Riva told his boss a proxy server with content filtering might be in order; his boss laughed and suggested they put in a bigger file server instead.

Bill Brenner | 30 Sep | Read more

More Opinion features


CSO Security Priorities Survey – prize terms and conditions

​By participating in CSO and Gigamon's survey on Security Priorities​, you will go into the draw for a chance to win a Apple iWatch Sport or the equivalent of $500 Visa Cashcard. Simply complete the survey in full to go into the draw. The survey opens on 27/11/2015 and closes on 29/02/2016. The prize draw will take place on 11th March 2016.

CSO staff | 27 Nov | Read more

​Visibility and control over SSL traffic in an era of HTTP/2.0

The emergence of attacks like POODLE and Heartbleed, has brought about renewed awareness about the importance of Secure Sockets Layer (SSL). At the enterprise level, SSL is what enables businesses to communicate securely with customers and partners. In order to keep SSL secure, businesses must have the visibility and control over SSL/ Transport Layer Security (TLS) traffic in the era of HTTP/2.0.

Benn Alp | 25 Nov | Read more

​Smart Phones Have Not So Smart Security

Smartphones. They have spurred a global revolution in how we work, play, shop, and relate to one another. They fuel innovation and productivity in astonishing ways, reaching even the most distant and underdeveloped corners of the world. They have empowered the disenfranchised, democratized information sharing, and shined a spotlight on corruption. They are also addictive and pervasive, affecting everything from personal health to public safety. And all of this has happened in less than ten years.

Dan Ross | 20 Nov | Read more

More Opinion opinons

Editor's Recommendations

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release

Market Place