Top IT Security Bloggers

Designing and Implementing Security Policy in Siloed Organizations

How do you write a security policy in an enterprise where you have a parent business unit and semi-autonomous business units underneath? You have to balance the "how" and the "what" correctly and there is a not-so-secret formula that I believe works ...

Read the full article
CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Email Security and Data Protection

Encrypt your sensitive email

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.