CSOonline Profile Banner
CSOonline Profile
CSOonline

@CSOonline

Followers
63K
Following
13K
Media
1K
Statuses
28K

From @FoundryIDG -- #CSO provides news, analysis and research on #security and #riskmanagement.

Boston area
Joined March 2009
Don't wanna be here? Send us removal request.
@CSOonline
CSOonline
9 months
Some strategies for CISOs freaked out by the specter of federal indictments
2
3
8
@CSOonline
CSOonline
4 years
#Cybersecurity skills shortage worsens — The problem is two-fold: 1) Not enough cybersecurity professionals in the overall pool, and 2) An acute shortage of advanced #cybersecurityskills. @joltsik @esg_global @ISSAINTL #securityskills #careers.
20
27
60
@CSOonline
CSOonline
7 years
Young girls are society's future cyber crime fighters, by @cybersecuritysf @cyber_sn @brain_babe @StaySafeOnline.
3
55
60
@CSOonline
CSOonline
7 years
4 open-source @MITREattack test tools compared, by @dstrom -
0
24
43
@CSOonline
CSOonline
7 years
Blockchain startup: 300,000 DDoS attacks will cause $150B in damages this year, by @cybersecuritysf -
1
25
35
@CSOonline
CSOonline
7 years
What is Shodan? The search engine for everything on the internet, by @toholdaquill -
2
25
38
@CSOonline
CSOonline
7 years
Free GoCrack password cracking tool helps admins test password security, by @PrivacyFanatic - @FireEye.
0
34
34
@CSOonline
CSOonline
7 years
The Qubes high-security operating system gains traction in the enterprise, by @toholdaquill -
0
21
34
@CSOonline
CSOonline
8 years
Hackers found 47 new vulnerabilities in 23 IoT devices at @DEFCON, by @lconstantin -
0
39
34
@CSOonline
CSOonline
7 years
What is cyber security? How to build a cyber security strategy -
1
33
36
@CSOonline
CSOonline
7 years
Ransomware attacks predicted to increase to 1 every 14 seconds, by @cybersecuritysf
1
43
32
@CSOonline
CSOonline
7 years
How hackers crack passwords: Why you can't stop them, by @MariaKorolov -
0
29
27
@CSOonline
CSOonline
3 months
NIST publishes timeline for quantum-resistant cryptography, but enterprises must move faster
1
0
8
@CSOonline
CSOonline
5 years
11 top #DEFCON and #BlackHat talks of all time – As we get ready for this year’s hacker summer camp (virtual this year), we take a look at some of the best talks of all time. @BlackHatEvents @defcon #BHUSA #defcon.
2
15
34
@CSOonline
CSOonline
9 years
Cybersecurity spending outlook: $1 trillion from 2017 to 2021, by @cybersecuritysf/ -
0
12
23
@CSOonline
CSOonline
6 years
0
21
32
@CSOonline
CSOonline
8 years
How Cisco is establishing itself as a cybersecurity leader - @Cisco #CiscoLive.
1
21
28
@CSOonline
CSOonline
7 years
Identify malware hashes and behaviors using the Mitre ATT&CK framework, by @dstrom -
0
15
29
@CSOonline
CSOonline
7 years
Shodan finds everything connected to the internet, even stuff that shouldn't be, by @toholdaquill -
0
15
24
@CSOonline
CSOonline
6 years
Pentester Academy is an affordable resource to learn #pentesting basics. @SecurityTube #infosec by @toholdaquill -
1
15
28
@CSOonline
CSOonline
4 years
This young woman was born to be in cybersec.
1
7
24
@CSOonline
CSOonline
4 years
@CIOTechTalk
CIO Tech Talk
4 years
March is #WomensHistoryMonth. Who are some fearless #WomenInTech who deserve a shout-out? Please retweet and tag them to amplify their voice!. #womenshistory
4
13
25
@CSOonline
CSOonline
5 years
All we can do is shake our head. (sigh).
@RayRedacted
Ray [REDACTED]
5 years
If you work in InfoSec, this paid- for keynote talk about cybersecurity will very likely cause you to have an emotional reaction. (H/t @Bing_Chris )
1
5
23
@CSOonline
CSOonline
7 years
What is personally identifiable information (PII)? How to protect it under GDPR, by @rogeragrimes -
0
24
22
@CSOonline
CSOonline
5 years
We must start educating girls to be the #cybersecurity leaders of tomorrow. -- @SylviaAcevedo, CEO, @girlscouts via @WIRED.
@girlscouts
Girl Scouts
5 years
"Educating girls empowers them to make meaningful contributions to society. Contributions that help everyone win. Except cybercriminals." - @SylviaAcevedo
2
12
23
@CSOonline
CSOonline
9 years
39% of the leaked European Space Agency passwords are three characters long, by @SteveD3 -
4
45
22
@CSOonline
CSOonline
3 years
For 3 weeks, the FBI held onto the keys to REvil’s ransomware as cybercriminals locked up company after company’s data. Why?. @burgessct sheds some light on the reasons: #REvil #ransomware #cyberattack #FBI.
0
8
20
@CSOonline
CSOonline
4 years
0
23
22
@CSOonline
CSOonline
3 years
The 10 most powerful cybersecurity companies:. @Cisco.@Cloudflare.@CrowdStrike.@Fortinet.@IBM.@Mandiant.@Microsoft.@PaloAltoNtwks.@Rapid7.@Zscaler. ➡️ Learn what makes these vendors the biggest power players: . #cybersecurity #networksecurity.
0
11
22
@CSOonline
CSOonline
5 years
Cybercrime in a #recession — Economic downturns force #cybercriminals to change focus & encourage others to resort to #cybercrime. Here are 10 things CISOs need to know: @DanSwinhoe @jeff_pollard2 @go1denhokie @uuallan. #phishing #malware #ransomware.
0
17
19
@CSOonline
CSOonline
7 years
Cyber attack surface facts, figures and statistics for 2017 to 2022, by @cybersecuritysf -
1
35
22
@CSOonline
CSOonline
8 years
Cousin @KevinMitnick, entrepreneur, by @cybersecuritysf -
1
13
20
@CSOonline
CSOonline
8 years
ESEA hacked, 1.5 million records leaked after alleged failed extortion attempt -
1
39
20
@CSOonline
CSOonline
7 years
Stuxnet explained: How code can destroy machinery and stop (or start) a war, by @jfruh -
0
26
20
@CSOonline
CSOonline
9 years
#Ad: Check out our new tool for benchmarking your company’s cloud strategy based on our latest IDG research survey.
2
5
21
@CSOonline
CSOonline
5 years
6 ways #HTTP3 benefits #security — HTTP/3 brings improved performance and reliability, along with various security and #privacy benefits, but there are some noteworthy challenges . #HTTP #HTTP2 #UDP #QUIC #gQUIC #MsQuic #InternetSecurity #WebSecurity.
0
8
19
@CSOonline
CSOonline
6 years
Improved #cybersecurity is more often cited as one motivation for #digitaltransformation, by @MariaKorolov
1
18
20
@CSOonline
CSOonline
5 years
#Google launched a commercial #zerotrust remote access service that enables #WorkFromHome employees to access internal web-based apps without the need of VPNs. . #BeyondCorp #RemoteAccess #NetworkSecurity #ZeroTrustNetworking @googlecloud.
0
9
19
@CSOonline
CSOonline
3 years
Disinformation has become a cyber threat. Employees who believe disinformation are more susceptible to social engineering and phishing campaigns – and attackers know it. @burgessct #socialengineering #phishing #cybersecurity #insiderthreat.
0
11
17
@CSOonline
CSOonline
3 years
6
8
19
@CSOonline
CSOonline
9 years
Hackers create TSA master key for @SafeSkiesLocks from scratch, release designs | #hope11 #hopeconf by @SteveD3 -
0
23
18
@CSOonline
CSOonline
6 years
Cloud security, network security and managed services -- just a few things people and vendors were buzzing about last week at #RSAC2019 @joltsik #cybersecurity #CloudSecurity #NetworkSecurity #RSAC.
0
7
18
@CSOonline
CSOonline
3 years
1
9
18
@CSOonline
CSOonline
5 years
2
17
18
@CSOonline
CSOonline
7 years
157 GB of highly sensitive data exposed. The data stored on the #LevelOne server didn’t require even a password to access it, @UpGuard reported. #CyberSecurity #DataBreach.
1
15
17
@CSOonline
CSOonline
6 years
Organizations have too many #cybersecurity tools – and threats are getting lost in the many, many alerts. What they want is 5 tools consolidated into 1, writes @joltsik #threatdetection #networksecurity #endpointprotection #EDR #NTA #malware #analytics.
1
14
20
@CSOonline
CSOonline
5 years
#Credentialstuffing, the automated use of breached usernames and passwords to access accounts, is low risk, high reward for #cybercriminals. There are things you can do, though, to make it harder for them. @troyhunt.
0
11
20
@CSOonline
CSOonline
8 years
How Shodan helped bring down a ransomware botnet: Shodan is a search engine that looks fo. | via @MariaKorolov.
0
27
17
@CSOonline
CSOonline
7 years
The CSO guide to top security conferences -
0
11
16
@CSOonline
CSOonline
6 years
California’s consumer #privacy act could have more repercussions on US companies than the EU’s #GDPR. @MariaKorolov breaks down what it is, types of companies affected, data it covers & more. #CCPA #dataprivacy.
2
17
16
@CSOonline
CSOonline
5 years
As we all deal w/ the personal effects of #covid19, @IDGworld’s #enterpriseit sites can help you deal with the IT & tech implications. See our ongoing coverage here: And at:.* @CIOonline: * @NetworkWorld:
Tweet media one
0
7
19
@CSOonline
CSOonline
4 years
If you still use #ActiveDirectory to manage identity for remote workers, you might want to consider moving to Azure Active Directory. @SBSdiva #AzureAD #IAM #NetworkSecurity.
0
6
18
@CSOonline
CSOonline
4 years
A disaster waiting to happen – The number of #botnet attacks on APIs in increasing, yet companies lag in implementing bot detection tools and best practices #cybersecurity #cybercrime #cyberattack.
0
18
17
@CSOonline
CSOonline
7 years
What is a fileless attack? How hackers invade systems without installing
0
26
16
@CSOonline
CSOonline
7 years
Cyber crime is a people problem, not a technology problem, by @cybersecuritysf @chronis @SecureSun.
0
22
19
@CSOonline
CSOonline
7 years
What is cyber resilience? Building cybersecurity shock absorbers for the enterprise, by @TerenaBell -
0
12
19
@CSOonline
CSOonline
8 years
Digital disruption is coming but most businesses don't have a plan .@CIOonline .
0
17
8
@CSOonline
CSOonline
5 years
The challenge for #security teams remains how to add security at the speed of #digitaltransformation. Organizations are doing it, though. @StacyTC @IDC_DigiSec @SchneiderElec.
0
7
17
@CSOonline
CSOonline
7 years
Updated list of the biggest data breaches of the 21st century -
2
23
14
@CSOonline
CSOonline
7 years
200 cybersecurity startups that received venture capital in 2017, by @cybersecuritysf #cybersecurityinvestments.
0
12
16
@CSOonline
CSOonline
4 years
We second this.
1
5
17
@CSOonline
CSOonline
4 years
Cybersecurity gaps in federal agencies threaten national security, the GAO says. The organization highlighted 4 areas that must be addressed. @burgessct #cybersecurity #government #USgovernment.
0
10
16
@CSOonline
CSOonline
5 years
Anyone who takes #creditcard payments needs to adhere to #PCIDSS — and may face fines if they fail. Use this guide to ensure you’re complying with the #cybersecurity standard: #websecurity #websitesecurity #ecommerce.
0
22
15
@CSOonline
CSOonline
6 years
#Hackers can claim abandoned #domain names to commit #fraud, steal info., by @toholdaquill -
1
8
16
@CSOonline
CSOonline
5 years
12 things every computer security professional should know to successfully fight the good fight, including:. ✅ Your opponents’ motives.✅ Types of malware.✅ Root cause exploits. ➡️ Find out what the others are & get the details:
0
16
15
@CSOonline
CSOonline
6 years
Many cities and regions are vying for the title of #Cybersecurity Capital. These 10 are the top contenders. Some you’d expect, but others might surprise you. @James_A_Martin @CybersecuritySF @VerizonVentures @SDCCOE @CushWake @GACyberCenter.
0
11
18
@CSOonline
CSOonline
4 years
Top ways attackers gained access to Windows networks in 2020. 1. Using PowerShell and Windows Command Shell.2. Signed binary process execution using Rundll32 & Mshta.3. Creating and modifying system processes. @redcanary #NetworkSecurity #CyberAttack.
1
7
16
@CSOonline
CSOonline
7 years
Before you buy a cybersecurity platform, make sure it has these features. #cybersecurity #cybersecuritytools.
0
14
18
@CSOonline
CSOonline
7 years
As cyber crime goes up, these companies are kicking up their #cybersecurity efforts, by @cybersecuritysf
0
14
16
@CSOonline
CSOonline
6 years
SAP users take note – Security experts warn of easy-to-use exploits that could lead to wave of attacks against #SAP systems. @lconstantin explains what users should do. @marianonunezdc @onapsis #SAPGateway #SAPMessageServer #SAPexploits #cybersecurity.
0
9
17
@CSOonline
CSOonline
7 years
What is Zero Trust? A model for more effective security -
0
38
7
@CSOonline
CSOonline
4 years
The state of the #DarkWeb — Professional criminal gangs, #malware as a service, and improved infrastructure for carrying out criminal activity are changing the dark web. @Ax_Sharma #cybercrime
Tweet media one
0
12
17
@CSOonline
CSOonline
6 years
Traditional firewalls are no longer effective, but today's smart #firewalls are a different story. #cybersecurity
0
15
16
@CSOonline
CSOonline
4 years
9 top anti-phishing tools. 💠 @BrandShieldltd Anti-#Phishing.💠 @RSAsecurity FraudAction.💠 @AvananSecurity.💠 @Barracuda Sentinel.💠 @IRONSCALES.💠 @Mimecast.💠 Office 365 Advanced Threat Protection.💠 @phishprotection.💠 @Sophos Email.
1
5
16
@CSOonline
CSOonline
7 years
CISOs will be looking for information on these #cybersecurity topics when they head to @RSAConference #RSAC.
0
9
15
@CSOonline
CSOonline
4 years
9 types of #malware + how to recognize them and remove them. ❗️Viruses.❗️Worms.❗️Trojans.❗️Hybrids & exotic forms.❗️#Ransomware.❗️Fileless malware.❗️#Adware.❗️#Malvertising.❗️#Spyware. ➡️ Get the details: #cybersecurity #cybercrime.
1
12
17
@CSOonline
CSOonline
7 years
. @cisco purchase of @duosec opens many new #IAM and #cloudsecurity opportunities for the company, writes @joltsik #networksecurity.
0
12
17
@CSOonline
CSOonline
6 years
Cyber attackers are getting smarter – bypassing endpoint protection security and accessing data. @MariaKorolov explains how they’re doing it – the top methods they use #malware #cyberattack #cybersecurity #EndpointSecurity.
1
21
16
@CSOonline
CSOonline
7 years
The rate of internet connection is outpacing our ability to secure it, by @cybersecuritysf #cybersecurity.
0
18
16
@CSOonline
CSOonline
6 years
With Zeek – formerly called Bro -- security pros can extract valuable network data and detect threats better, faster, writes @zkerravala @Bro_IDS #NetworkMonitoring #ThreatDetection.
0
13
17
@CSOonline
CSOonline
6 years
#Hackers love going after city & regional governments. @metacurity explores why and what municipalities can do to reduce the threat. . #cybersecurity #cyberattack #malware #ransomware #threatdetection.
0
14
16
@CSOonline
CSOonline
6 years
Anti- #keylogger software can encrypt keystrokes and scan for the #malware. #cybersecurity-
0
7
15
@CSOonline
CSOonline
7 years
GDPR boosts IAM & biometrics spending, by @cybersecuritysf #GDPR #GDPRcompliance #IAM #IdentityAccess.
1
17
16
@CSOonline
CSOonline
5 years
#DDoS attacks are evolving – they’re growing more prevalent and stronger . #cyberattack #Mirai #Torii #DemonBot #botnet #APDoS.
0
14
14
@CSOonline
CSOonline
5 years
You’ve heard of #phishing attacks, well, now we have #smishing (via SMS messages) and #vishing (via voice calls). @MichelleDrolet2 explains what they are. #cyberattack #cybersecurity #hacking.
0
8
14
@CSOonline
CSOonline
6 years
All you need to know about #botnets -- @MariaKorolov explains how they work, the damage they do, how to detect them, and how to prevent botnet attacks #IoT #IoTsecurity #mirai #reaper #echobot.
0
13
14
@CSOonline
CSOonline
5 years
0
10
13
@CSOonline
CSOonline
7 years
A business will fall victim to a ransomware attack every 14 seconds -- by @CybersecuritySF #CybersecurityFacts.
1
31
16
@CSOonline
CSOonline
8 years
If you haven't reviewed your security policy in the last 6 months, it's time.
0
22
15
@CSOonline
CSOonline
4 years
0
9
16
@CSOonline
CSOonline
6 years
Security can no longer be considered an IT afterthought at small and midsize businesses, writes @joltsik #CyberSecurity #CyberSecurityChallenges #SMBs.
0
18
16
@CSOonline
CSOonline
4 years
Beware – A #hacker group known for targeting #fintech companies has new #Python #malware and infection tricks. #Evilnum #WindowsSecurity #PyVil #RAT #cyberattack #APT.
0
12
14
@CSOonline
CSOonline
5 years
How to secure the cloud — Tools, information and organizational structure needed to execute a successful #cloudsecurity strategy @mgbits @AlertLogic @gigamon @vansonbourne @menadeau.
0
9
14
@CSOonline
CSOonline
7 years
AWS is suddenly a force in the cybersecurity market, by @cybersecuritysf #AmazonGuardDuty #CloudSecurity.
1
20
14
@CSOonline
CSOonline
5 years
If you can do only a few of the 20 CIS Critical Security Controls, @rogeragrimes says you should do these 5: @CISecurity #security #cybersecurity #cyberdefense.
0
9
16
@CSOonline
CSOonline
6 years
"Cyber criminals are very flexible and creative." #infosec #blockchain @digitalshadows
0
10
15
@CSOonline
CSOonline
5 years
3 ways #cybercriminals are exploiting the #COVID19 crisis . 1. #Phishing emails.2. Malicious apps.3. Bad domains. ➡️ Learn more about these & other threats: @DanSwinhoe @digitalshadows @proofpoint @BAESystems_AI @Bitdefender
Tweet media one
0
12
16
@CSOonline
CSOonline
9 years
Machine learning is reshaping security, by @leslieklambert - @IDGCN #infosec.
0
9
14
@CSOonline
CSOonline
6 years
"#Hacking web applications is an easy first step into #pentesting." #infosec @OWASP, by @toholdaquill -
0
9
15
@CSOonline
CSOonline
6 years
#Phishing is the root cause of 48 percent of data breaches, according to recent @F5Labs report. Education & the right #security tools can reduce that, writes @zkerravala #email #emailsecurity #databreach.
0
12
12