Search Engine Optimization Overview
71
100
CSO | Security news, features and analysis about prevention, protection and business innovation.
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.
Seo
Title
The title tag must be between 1 and 60 characters.
The current title has 96 characters.
Meta description
The meta description tag is good.
CSO offers the latest information and best practices on business continuity and data protection, best practices for prevention of social engineering scams, malware and breaches, and tips and advice abut security careers and leadership.
Headings
The headings are properly set.
  1. cso online
  1. Data capture by border agencies can and will happen – are your on-the-road employees prepared?
  2. Phishing attacks increase by over 31% in third quarter: Report
  3. How to update your Windows driver blocklist to keep malicious drivers away
  4. Data capture by border agencies can and will happen – are your on-the-road employees prepared?
  5. Phishing attacks increase by over 31% in third quarter: Report
  6. Top cybersecurity M&A deals for 2022
  7. How Cisco's Cloud Control Framework helps it comply with multiple security standards
  8. How to update your Windows driver blocklist to keep malicious drivers away
  9. Microsoft Event Log vulnerabilities threaten some Windows operating systems
  10. Akamai to boost network-layer DDoS protection with new scrubbing centers
  11. 8 hallmarks of a proactive security strategy
  12. Blockchain security companies tackle cryptocurrency theft, ransom tracing
  13. Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC
  14. Iran’s nuclear energy agency confirms email server hacked
  15. When CISOs are doomed to fail, and how to improve your chances of success
  16. It’s time to prioritize SaaS security
  17. IoT security strategy from enterprises using connected devices
  18. Security Recruiter Directory
  1. Many countries routinely download device content from travelers at the border. Getting ahead of this eventuality can help protect sensitive data and maintain privacy for employees and their company.
  2. Cybersecurity company Vade reports that attackers sent more than 203.9 million emails in the third quarter alone, up from 155.3 million in the prior quarter
  3. The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.
  4. Its open-source Cloud Control Framework gives Cisco a common template to meet security standards and regulatory requirements across the globe.
  5. An investigation revealed that Microsoft’s malicious driver blocklist wasn’t updating as expected. Here’s how to make sure you’re not letting bad actors gain access to your system through these carefully crafted attack tools.
  6. Two newly discovered vulnerabilities have been found to impact an Internet Explorer-specific Event Log present on operating systems prior to Windows 11.
  7. Akamai says its Prolexic DDoS protection service will double in capacity thanks to new scrubbing-center buildouts.
  8. More CISOs are balancing their response and recovery capabilities with proactive measures that anticipate attacks and vulnerabilities.
  9. Cybercrime that involves cryptocurrency is at an all-time high, and some security companies hope to help prevent it.
  10. UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.
  11. Iranian hacking group Black Reward has claimed responsibility for a breach at the email server of the country's Bushehr nuclear power plant, in support of nationwide protests over the death of a young woman in police custody.
  12. Immense pressure to reduce cybersecurity risk, limited resources, or unsupportive executive leadership can make CISOs a target for blame. Here's how some of them cope.
  13. Did our focus on IaaS security come at the expense of SaaS security? Know what to guard against, especially excessive user permissions and misconfigured UIs, APIs, and integrations.
  14. IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.
  15. To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Content keywords
The content has relevant keywords.
csosecuritynewsfeaturesandanalysisaboutprotectionand
Image keywords
There are 47 images with missing alt attributes.
  1. https://alt.idgesg.net/images/furniture/cso/cso-white-logo.svg
  2. https://idge.staticworld.net/images/twitter.svg
  3. https://idge.staticworld.net/images/facebook.svg
  4. https://idge.staticworld.net/images/mail.svg
  5. https://idge.staticworld.net/images/twitter.svg
  6. https://idge.staticworld.net/images/facebook.svg
  7. https://idge.staticworld.net/images/mail.svg
  8. https://idge.staticworld.net/images/twitter.svg
  9. https://idge.staticworld.net/images/facebook.svg
  10. https://idge.staticworld.net/images/mail.svg
  11. https://idge.staticworld.net/images/twitter.svg
  12. https://idge.staticworld.net/images/facebook.svg
  13. https://idge.staticworld.net/images/mail.svg
  14. https://idge.staticworld.net/images/twitter.svg
  15. https://idge.staticworld.net/images/facebook.svg
  16. https://idge.staticworld.net/images/mail.svg
  17. https://idge.staticworld.net/images/twitter.svg
  18. https://idge.staticworld.net/images/facebook.svg
  19. https://idge.staticworld.net/images/mail.svg
  20. https://idge.staticworld.net/images/twitter.svg
  21. https://idge.staticworld.net/images/facebook.svg
  22. https://idge.staticworld.net/images/mail.svg
  23. https://idge.staticworld.net/images/twitter.svg
  24. https://idge.staticworld.net/images/facebook.svg
  25. https://idge.staticworld.net/images/mail.svg
  26. https://idge.staticworld.net/images/twitter.svg
  27. https://idge.staticworld.net/images/facebook.svg
  28. https://idge.staticworld.net/images/mail.svg
  29. https://idge.staticworld.net/images/twitter.svg
  30. https://idge.staticworld.net/images/facebook.svg
  31. https://idge.staticworld.net/images/mail.svg
  32. https://idge.staticworld.net/images/twitter.svg
  33. https://idge.staticworld.net/images/facebook.svg
  34. https://idge.staticworld.net/images/mail.svg
  35. https://idge.staticworld.net/images/twitter.svg
  36. https://idge.staticworld.net/images/facebook.svg
  37. https://idge.staticworld.net/images/mail.svg
  38. https://idge.staticworld.net/images/twitter.svg
  39. https://idge.staticworld.net/images/facebook.svg
  40. https://idge.staticworld.net/images/mail.svg
  41. https://idge.staticworld.net/images/twitter.svg
  42. https://idge.staticworld.net/images/facebook.svg
  43. https://idge.staticworld.net/images/mail.svg
  44. https://idge.staticworld.net/images/twitter.svg
  45. https://idge.staticworld.net/images/facebook.svg
  46. https://idge.staticworld.net/images/mail.svg
  47. https://sb.scorecardresearch.com/p?c1=2&c2=6035308&cv=2.0&cj=1
SEO friendly URL
The URL is SEO friendly.
https://www.csoonline.com/
404 page
The website has 404 error pages.
https://www.csoonline.com/404-2ad7aff0d62b6744ad116d5aa2047e56
Robots.txt
The webpage can be accessed by search engines.
Noindex
The webpage does not have a noindex tag set.
In-page links
The webpage contains more than 150 links.
  1. Close Ad
  2. cso online
  3. United States
  4. ASEAN
  5. Australia
  6. India
  7. United Kingdom
  8. Germany
  9. https://www.csoonline.com/insider/
  10. Defending quantum-based data with quantum-level security: a UK trial looks to the future
  11. How GDPR has inspired a global arms race on privacy regulations
  12. The state of privacy regulations across Asia
  13. Lessons learned from 2021 network security events
  14. More Insider
  15. Sign Out
  16. Sign In
  17. Register
  18. https://www.csoonline.com/about/learn-about-insider.html
  19. Sign Out
  20. Sign In
  21. Register
  22. Your Microsoft network is only as secure as your oldest server
  23. How CISOs can drive the security narrative
  24. Malware variability explained: Changing behavior for stealth and persistence
  25. Microsoft announces new security, privacy features at Ignite
  26. https://www.csoonline.com/about/learn-about-insider.html
  27. here.
  28. Sign Out
  29. Sign In
  30. Register
  31. About Us
  32. Contact
  33. Republication Permissions
  34. Privacy Policy
  35. Cookie Policy
  36. Member Preferences
  37. Ad Choices
  38. E-commerce Links
  39. California: Do Not Sell My Personal Info
  40. Data capture by border agencies can and will happen – are your on-the-road employees prepared?
  41. Phishing attacks increase by over 31% in third quarter: Report
  42. How to update your Windows driver blocklist to keep malicious drivers away
  43. CSO50 2022 Award Winners
  44. CSO Hall of Fame honorees
  45. https://www.csoonline.com/article/3673269/ransomware-attacks-on-retailers-rose-75-in-2021.html
  46. Ransomware attacks on retailers rose 75% in 2021
  47. https://www.csoonline.com/article/3672429/4-strategy-game-changers-for-finding-cybersecurity-talent.html
  48. 4 strategy game-changers for finding cybersecurity talent
  49. https://www.csoonline.com/article/3672155/global-companies-say-supply-chain-partners-expose-them-to-ransomware.html
  50. Global companies say supply chain partners expose them to ransomware
  51. https://www.csoonline.com/article/3672531/how-azure-active-directory-opens-new-authentication-risks.html
  52. How Azure Active Directory opens new authentication risks
  53. https://www.csoonline.com/article/3678291/data-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html
  54. Data capture by border agencies can and will happen – are your on-the-road employees prepared?
  55. Christopher Burgess
  56. https://www.csoonline.com/article/3678311/phishing-attacks-increase-by-over-31-in-third-quarter-report.html
  57. Phishing attacks increase by over 31% in third quarter: Report
  58. Charlotte Trueman
  59. https://www.csoonline.com/article/3646608/top-cybersecurity-manda-deals-for-2022.html
  60. Top cybersecurity M&A deals for 2022
  61. CSO staff
  62. https://www.csoonline.com/article/3677450/how-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html
  63. How Cisco's Cloud Control Framework helps it comply with multiple security standards
  64. Poornima Apte
  65. https://www.csoonline.com/article/3677856/how-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html
  66. How to update your Windows driver blocklist to keep malicious drivers away
  67. Susan Bradley
  68. https://www.csoonline.com/article/3677576/microsoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html
  69. Microsoft Event Log vulnerabilities threaten some Windows operating systems
  70. Michael Hill
  71. https://www.csoonline.com/article/3677853/akamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html
  72. Akamai to boost network-layer DDoS protection with new scrubbing centers
  73. Jon Gold
  74. https://www.csoonline.com/article/3677496/8-hallmarks-of-a-proactive-security-strategy.html
  75. 8 hallmarks of a proactive security strategy
  76. Mary K. Pratt
  77. https://www.csoonline.com/article/3677469/blockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html
  78. Blockchain security companies tackle cryptocurrency theft, ransom tracing
  79. Cynthia Brumfield
  80. https://www.csoonline.com/article/3677850/security-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html
  81. Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC
  82. Michael Hill
  83. https://www.csoonline.com/article/3677849/irans-nuclear-energy-agency-confirms-email-server-hacked.html
  84. Iran’s nuclear energy agency confirms email server hacked
  85. Apurva Venkat
  86. https://www.csoonline.com/article/3676909/when-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html
  87. When CISOs are doomed to fail, and how to improve your chances of success
  88. Andrada Fiscutean
  89. David Linthicum
  90. Maria Korolov
  91. https://www.csoonline.com/article/3013033/security-recruiter-directory.html
  92. Security Recruiter Directory
  93. https://www.csoonline.com/newsletters/signup.html
  94. Get the best of CSO delivered to your inbox. Sign up for our free newsletters
  95. Subscribe
  96. https://www.csoonline.com/article/3677858/an-intelligent-way-to-monitor-and-manage-your-cyber-risks.html
  97. Sponsored by SecurityScorecard An Intelligent Way to Monitor and Manage Your Cyber Risks
  98. https://www.csoonline.com/article/3678290/10-best-practices-for-a-zero-trust-data-center.html
  99. Sponsored by Juniper Networks 10 Best Practices for a Zero Trust Data Center
  100. https://www.csoonline.com/article/3678188/is-it-time-to-rethink-your-network-and-application-performance-management-strategy.html
  101. Sponsored by Netscout Is It Time to Rethink Your Network and Application Performance Management
  102. CSO Online
  103. About Us
  104. Contact
  105. Republication Permissions
  106. Privacy Policy
  107. Cookie Policy
  108. Member Preferences
  109. Ad Choices
  110. E-commerce Links
  111. California: Do Not Sell My Personal Info
  112. Copyright
  113. CSO Online
  1. Learn More
  2. NEW FROM IDG Learn More
  3. Advertising
  4. Foundry Careers
  5. http://www.linkedin.com/company/csoonline
  6. https://twitter.com/csoonline
  7. https://www.facebook.com/CSOonline
  8. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678291%2Fdata-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html&via=csoonline&text=Data+capture+by+border+agencies+can+and+will+happen+%E2%80%93+are+your+on-the-road
  9. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678291%2Fdata-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html
  10. mailto:?Subject=Data capture by border agencies can and will happen – are your on-the-road employees prepared?&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678291%2Fdata-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html
  11. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678311%2Fphishing-attacks-increase-by-over-31-in-third-quarter-report.html&via=csoonline&text=Phishing+attacks+increase+by+over+31%25+in+third+quarter%3A+Report+
  12. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678311%2Fphishing-attacks-increase-by-over-31-in-third-quarter-report.html
  13. mailto:?Subject=Phishing attacks increase by over 31% in third quarter: Report &Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678311%2Fphishing-attacks-increase-by-over-31-in-third-quarter-report.html
  14. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3646608%2Ftop-cybersecurity-manda-deals-for-2022.html&via=csoonline&text=Top+cybersecurity+M%26A+deals+for+2022
  15. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3646608%2Ftop-cybersecurity-manda-deals-for-2022.html
  16. mailto:?Subject=Top cybersecurity M&A deals for 2022&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3646608%2Ftop-cybersecurity-manda-deals-for-2022.html
  17. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677450%2Fhow-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html&via=csoonline&text=How+Cisco%27s+Cloud+Control+Framework+helps+it+comply+with+multiple+security
  18. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677450%2Fhow-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html
  19. mailto:?Subject=How Cisco's Cloud Control Framework helps it comply with multiple security standards&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677450%2Fhow-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html
  20. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677856%2Fhow-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html&via=csoonline&text=How+to+update+your+Windows+driver+blocklist+to+keep+malicious+drivers+away
  21. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677856%2Fhow-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html
  22. mailto:?Subject=How to update your Windows driver blocklist to keep malicious drivers away&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677856%2Fhow-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html
  23. https://bit.ly/3SBPYmS
  24. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677576%2Fmicrosoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html&via=csoonline&text=Microsoft+Event+Log+vulnerabilities+threaten+some+Windows+operating+systems
  25. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677576%2Fmicrosoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html
  26. mailto:?Subject=Microsoft Event Log vulnerabilities threaten some Windows operating systems&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677576%2Fmicrosoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html
  27. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677853%2Fakamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html&via=csoonline&text=Akamai+to+boost+network-layer+DDoS+protection+with+new+scrubbing+centers
  28. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677853%2Fakamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html
  29. mailto:?Subject=Akamai to boost network-layer DDoS protection with new scrubbing centers&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677853%2Fakamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html
  30. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677496%2F8-hallmarks-of-a-proactive-security-strategy.html&via=csoonline&text=8+hallmarks+of+a+proactive+security+strategy
  31. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677496%2F8-hallmarks-of-a-proactive-security-strategy.html
  32. mailto:?Subject=8 hallmarks of a proactive security strategy&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677496%2F8-hallmarks-of-a-proactive-security-strategy.html
  33. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677469%2Fblockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html&via=csoonline&text=Blockchain+security+companies+tackle+cryptocurrency+theft%2C+ransom+tracing
  34. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677469%2Fblockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html
  35. mailto:?Subject=Blockchain security companies tackle cryptocurrency theft, ransom tracing&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677469%2Fblockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html
  36. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677850%2Fsecurity-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html&via=csoonline&text=Security+by+design+vital+to+protecting+IoT%2C+smart+cities+around+the+world%2C
  37. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677850%2Fsecurity-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html
  38. mailto:?Subject=Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677850%2Fsecurity-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html
  39. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677849%2Firans-nuclear-energy-agency-confirms-email-server-hacked.html&via=csoonline&text=Iran%E2%80%99s+nuclear+energy+agency+confirms+email+server+hacked+
  40. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677849%2Firans-nuclear-energy-agency-confirms-email-server-hacked.html
  41. mailto:?Subject=Iran’s nuclear energy agency confirms email server hacked &Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677849%2Firans-nuclear-energy-agency-confirms-email-server-hacked.html
  42. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3676909%2Fwhen-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html&via=csoonline&text=When+CISOs+are+doomed+to+fail%2C+and+how+to+improve+your+chances+of+success
  43. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3676909%2Fwhen-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html
  44. mailto:?Subject=When CISOs are doomed to fail, and how to improve your chances of success&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3676909%2Fwhen-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html
  45. https://www.infoworld.com/article/3677270/dont-neglect-saas-security.html
  46. It’s time to prioritize SaaS security
  47. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677270%2Fdont-neglect-saas-security.html&via=csoonline&text=It%E2%80%99s+time+to+prioritize+SaaS+security
  48. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677270%2Fdont-neglect-saas-security.html
  49. mailto:?Subject=It’s time to prioritize SaaS security&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677270%2Fdont-neglect-saas-security.html
  50. https://www.networkworld.com/article/3677470/iot-security-strategy-from-those-who-use-connected-devices.html
  51. IoT security strategy from enterprises using connected devices
  52. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677470%2Fiot-security-strategy-from-those-who-use-connected-devices.html&via=csoonline&text=IoT+security+strategy+from+enterprises+using+connected+devices
  53. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677470%2Fiot-security-strategy-from-those-who-use-connected-devices.html
  54. mailto:?Subject=IoT security strategy from enterprises using connected devices&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677470%2Fiot-security-strategy-from-those-who-use-connected-devices.html
  55. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html&via=csoonline&text=Security+Recruiter+Directory
  56. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html
  57. mailto:?Subject=Security Recruiter Directory&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html
  58. https://hpwolfsecurity.csoonline.com/p/1?utm_source=cso&utm_medium=organic&utm_campaign=hpwolf&utm_content=CSO_home
  59. Featured Sponsor HP Wolf Security The Need for Endpoint Security Rooted In Zero Trust
  60. http://www.linkedin.com/company/csoonline
  61. https://twitter.com/csoonline
  62. https://www.facebook.com/CSOonline
  63. Advertising
  64. Foundry Careers
  65. CIO
  66. Computerworld
  67. InfoWorld
  68. Network World
Language
The webpage has the language declared.
en
Favicon
The webpage has a favicon.
https://idge.staticworld.net/cso/CSO_logo_300x300.png
Performance
Text compression
The HTML file is compressed.
Load time
The webpage loaded in 0.15 seconds.
Page size
The size of the HTML webpage is 34,030.00.
HTTP requests
The webpage makes more than 50.00 HTTP requests.
  1. https://www.csoonline.com/www/js/jquery/jquery-1.10.2.min.js
  2. https://www.csoonline.com/www/js/jquery/jquery_cookie.js
  3. https://www.csoonline.com/www/js/apollo-locales.js?v=20221024112904
  4. https://d2zv5rkii46miq.cloudfront.net/0/latest/cmp_shim.js
  5. https://cmpv2.csoonline.com/wrapperMessagingWithoutDetection.js
  6. https://ccpa.sp-prod.net/ccpa.js
  7. https://www.csoonline.com/www/js/init_device.js
  8. https://cdn.adsafeprotected.com/iasPET.1.js
  9. https://js-sec.indexww.com/ht/p/183980-47728333013839.js
  10. https://www.csoonline.com/www/js/ads/gpt_includes.js?v=20221024112904
  11. https://www.csoonline.com/www.idge/js/thm_pre.js?v=20221024112904
  12. https://www.csoonline.com/www/js/ads/gpt_starter.js?1234
  13. https://www.csoonline.com/www/js/ads/ias_gpt_launcher.js?v=20221024112904
  14. https://www.csoonline.com/www/js/ads/ad.js
  15. https://s.ntv.io/serve/load.js
  16. https://www.csoonline.com/www/js/insider/insider_reg_api.js?v=20221024112904
  17. https://www.csoonline.com/www/js/homepage.js
  18. https://www.csoonline.com/www/js/jquery/jquery-ui.js
  19. https://www.csoonline.com/www/js/jquery/jquery.dfp.min.js
  20. https://www.csoonline.com/www.idge/js/mule/shortstack_nav.js
  21. https://www.csoonline.com/www/js/jquery/jquery.timeago.js
  22. https://www.csoonline.com/www/js/analytics/tracking.js
  23. https://www.csoonline.com/www.idge/js/global.js?v=20221024112904
  24. https://www.csoonline.com/www/js/webfonts/ss-social.js
  25. https://www.csoonline.com/www/js/webfonts/ss-standard.js
  26. https://www.csoonline.com/www/js/analytics/brandAnalytics.js
  27. https://www.csoonline.com/www/js/locales-editions-slug.js?v=20221024112904
  28. https://www.csoonline.com/www/js/ads/jquery.lazyload-ad.js
  29. https://cdn.subscribers.com/assets/subscribers.js
  1. https://www.csoonline.com/www/css/homepage.css?v=20221024112904
  2. https://www.csoonline.com/www.idge/css/insider-promo-styles.css?v=20221024112904
  3. https://www.csoonline.com/www.idge/css/print.css
  4. https://www.csoonline.com/www.idge.cso/css/oc-homepage.css?v=20221024112904
  5. https://www.csoonline.com/www.idge/css/webfonts/ss-social.css
  6. https://www.csoonline.com/www.idge/css/webfonts/ss-standard.css
  7. https://use.fontawesome.com/releases/v5.6.1/css/all.css
  8. https://use.typekit.net/vjj6ndp.css
  9. https://www.csoonline.com/www/css/oc-header.css?v=20221024112904
  10. https://www.csoonline.com/www.idge.cso/css/oc-header.css?v=20221024112904
  11. https://www.csoonline.com/www.idgcsmb/css/tso-links.css?v=20221024112904
  12. https://www.csoonline.com/www.idge/css/foot.css?v=20221024112904
  13. https://www.csoonline.com/www.idge.cso/css/foot.css?v=20221024112904
  1. https://alt.idgesg.net/images/furniture/cso/cso-white-logo.svg
  2. https://alt.idgesg.net/images/furniture/cso/cso-white-logo.svg
  3. https://idge.staticworld.net/images/twitter.svg
  4. https://idge.staticworld.net/images/facebook.svg
  5. https://idge.staticworld.net/images/mail.svg
  6. https://idge.staticworld.net/images/twitter.svg
  7. https://idge.staticworld.net/images/facebook.svg
  8. https://idge.staticworld.net/images/mail.svg
  9. https://idge.staticworld.net/images/twitter.svg
  10. https://idge.staticworld.net/images/facebook.svg
  11. https://idge.staticworld.net/images/mail.svg
  12. https://idge.staticworld.net/images/twitter.svg
  13. https://idge.staticworld.net/images/facebook.svg
  14. https://idge.staticworld.net/images/mail.svg
  15. https://idge.staticworld.net/images/twitter.svg
  16. https://idge.staticworld.net/images/facebook.svg
  17. https://idge.staticworld.net/images/mail.svg
  18. https://images.idgesg.net/images/article/2022/10/ed_mobile_767x450-perspectives-100933830-orig.jpg
  19. https://idge.staticworld.net/images/twitter.svg
  20. https://idge.staticworld.net/images/facebook.svg
  21. https://idge.staticworld.net/images/mail.svg
  22. https://idge.staticworld.net/images/twitter.svg
  23. https://idge.staticworld.net/images/facebook.svg
  24. https://idge.staticworld.net/images/mail.svg
  25. https://idge.staticworld.net/images/twitter.svg
  26. https://idge.staticworld.net/images/facebook.svg
  27. https://idge.staticworld.net/images/mail.svg
  28. https://idge.staticworld.net/images/twitter.svg
  29. https://idge.staticworld.net/images/facebook.svg
  30. https://idge.staticworld.net/images/mail.svg
  31. https://idge.staticworld.net/images/twitter.svg
  32. https://idge.staticworld.net/images/facebook.svg
  33. https://idge.staticworld.net/images/mail.svg
  34. https://idge.staticworld.net/images/twitter.svg
  35. https://idge.staticworld.net/images/facebook.svg
  36. https://idge.staticworld.net/images/mail.svg
  37. https://idge.staticworld.net/images/twitter.svg
  38. https://idge.staticworld.net/images/facebook.svg
  39. https://idge.staticworld.net/images/mail.svg
  40. https://idge.staticworld.net/images/twitter.svg
  41. https://idge.staticworld.net/images/facebook.svg
  42. https://idge.staticworld.net/images/mail.svg
  43. https://idge.staticworld.net/images/twitter.svg
  44. https://idge.staticworld.net/images/facebook.svg
  45. https://idge.staticworld.net/images/mail.svg
  46. https://idge.staticworld.net/images/twitter.svg
  47. https://idge.staticworld.net/images/facebook.svg
  48. https://idge.staticworld.net/images/mail.svg
  49. https://alt.idgesg.net/images/furniture/foundry/foundry-logo-white.svg
  50. https://sb.scorecardresearch.com/p?c1=2&c2=6035308&cv=2.0&cj=1
  1. https://www.googletagmanager.com/ns.html?GTM-WR6LD2P
Image format
There are 2 images that are not using the AVIF, WebP format.
  1. https://images.idgesg.net/images/article/2022/10/ed_mobile_767x450-perspectives-100933830-orig.jpg
  2. https://sb.scorecardresearch.com/p?c1=2&c2=6035308&cv=2.0&cj=1
JavaScript defer
The are 29 javascript resources without the defer attribute.
  1. https://www.csoonline.com/www/js/jquery/jquery-1.10.2.min.js
  2. https://www.csoonline.com/www/js/jquery/jquery_cookie.js
  3. https://www.csoonline.com/www/js/apollo-locales.js?v=20221024112904
  4. https://d2zv5rkii46miq.cloudfront.net/0/latest/cmp_shim.js
  5. https://cmpv2.csoonline.com/wrapperMessagingWithoutDetection.js
  6. https://ccpa.sp-prod.net/ccpa.js
  7. https://www.csoonline.com/www/js/init_device.js
  8. https://cdn.adsafeprotected.com/iasPET.1.js
  9. https://js-sec.indexww.com/ht/p/183980-47728333013839.js
  10. https://www.csoonline.com/www/js/ads/gpt_includes.js?v=20221024112904
  11. https://www.csoonline.com/www.idge/js/thm_pre.js?v=20221024112904
  12. https://www.csoonline.com/www/js/ads/gpt_starter.js?1234
  13. https://www.csoonline.com/www/js/ads/ias_gpt_launcher.js?v=20221024112904
  14. https://www.csoonline.com/www/js/ads/ad.js
  15. https://s.ntv.io/serve/load.js
  16. https://www.csoonline.com/www/js/insider/insider_reg_api.js?v=20221024112904
  17. https://www.csoonline.com/www/js/homepage.js
  18. https://www.csoonline.com/www/js/jquery/jquery-ui.js
  19. https://www.csoonline.com/www/js/jquery/jquery.dfp.min.js
  20. https://www.csoonline.com/www.idge/js/mule/shortstack_nav.js
  21. https://www.csoonline.com/www/js/jquery/jquery.timeago.js
  22. https://www.csoonline.com/www/js/analytics/tracking.js
  23. https://www.csoonline.com/www.idge/js/global.js?v=20221024112904
  24. https://www.csoonline.com/www/js/webfonts/ss-social.js
  25. https://www.csoonline.com/www/js/webfonts/ss-standard.js
  26. https://www.csoonline.com/www/js/analytics/brandAnalytics.js
  27. https://www.csoonline.com/www/js/locales-editions-slug.js?v=20221024112904
  28. https://www.csoonline.com/www/js/ads/jquery.lazyload-ad.js
  29. https://cdn.subscribers.com/assets/subscribers.js
DOM size
The DOM size is optimal.
The HTML file has 904 DOM nodes.
Security
HTTPS encryption
The webpage uses HTTPS encryption.
The HTML file has https://www.csoonline.com/ DOM nodes.
Mixed content
There are no mixed content resources on the webpage.
Server signature
The webpage has a public server signature.
Apache-Coyote/1.1
Unsafe cross-origin links
The webpage has 38 unsafe cross-origin links.
Plaintext email
The webpage does not contain any plaintext emails.
Miscellaneous
Structured data
The webpage has structured data.
        Meta viewport
        The webpage has a meta viewport tag set.
        width=device-width, initial-scale=1.0
        Character set
        The webpage does not have a charset declared.
        Sitemap
        The website has sitemaps.
        1. https://www.csoonline.com/sitemap.xml
        2. https://www.csoonline.com/seo/sitemap/https/articles/index.xml
        Social
        The webpage has 36 social links.
        1. https://twitter.com/csoonline
        2. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678291%2Fdata-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html&via=csoonline&text=Data+capture+by+border+agencies+can+and+will+happen+%E2%80%93+are+your+on-the-road
        3. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678311%2Fphishing-attacks-increase-by-over-31-in-third-quarter-report.html&via=csoonline&text=Phishing+attacks+increase+by+over+31%25+in+third+quarter%3A+Report+
        4. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3646608%2Ftop-cybersecurity-manda-deals-for-2022.html&via=csoonline&text=Top+cybersecurity+M%26A+deals+for+2022
        5. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677450%2Fhow-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html&via=csoonline&text=How+Cisco%27s+Cloud+Control+Framework+helps+it+comply+with+multiple+security
        6. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677856%2Fhow-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html&via=csoonline&text=How+to+update+your+Windows+driver+blocklist+to+keep+malicious+drivers+away
        7. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677576%2Fmicrosoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html&via=csoonline&text=Microsoft+Event+Log+vulnerabilities+threaten+some+Windows+operating+systems
        8. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677853%2Fakamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html&via=csoonline&text=Akamai+to+boost+network-layer+DDoS+protection+with+new+scrubbing+centers
        9. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677496%2F8-hallmarks-of-a-proactive-security-strategy.html&via=csoonline&text=8+hallmarks+of+a+proactive+security+strategy
        10. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677469%2Fblockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html&via=csoonline&text=Blockchain+security+companies+tackle+cryptocurrency+theft%2C+ransom+tracing
        11. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677850%2Fsecurity-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html&via=csoonline&text=Security+by+design+vital+to+protecting+IoT%2C+smart+cities+around+the+world%2C
        12. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677849%2Firans-nuclear-energy-agency-confirms-email-server-hacked.html&via=csoonline&text=Iran%E2%80%99s+nuclear+energy+agency+confirms+email+server+hacked+
        13. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3676909%2Fwhen-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html&via=csoonline&text=When+CISOs+are+doomed+to+fail%2C+and+how+to+improve+your+chances+of+success
        14. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677270%2Fdont-neglect-saas-security.html&via=csoonline&text=It%E2%80%99s+time+to+prioritize+SaaS+security
        15. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677470%2Fiot-security-strategy-from-those-who-use-connected-devices.html&via=csoonline&text=IoT+security+strategy+from+enterprises+using+connected+devices
        16. https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html&via=csoonline&text=Security+Recruiter+Directory
        17. https://twitter.com/csoonline
        1. https://www.facebook.com/CSOonline
        2. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678291%2Fdata-capture-by-border-agencies-can-and-will-happen-are-your-on-the-road-employees-prepared.html
        3. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3678311%2Fphishing-attacks-increase-by-over-31-in-third-quarter-report.html
        4. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3646608%2Ftop-cybersecurity-manda-deals-for-2022.html
        5. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677450%2Fhow-ciscos-cloud-control-framework-helps-it-comply-with-multiple-security-standards.html
        6. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677856%2Fhow-to-update-your-windows-driver-blocklist-to-keep-malicious-drivers-away.html
        7. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677576%2Fmicrosoft-event-log-vulnerabilities-threaten-some-windows-operating-systems.html
        8. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677853%2Fakamai-to-boost-network-layer-ddos-protection-with-new-scrubbing-centers.html
        9. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677496%2F8-hallmarks-of-a-proactive-security-strategy.html
        10. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677469%2Fblockchain-security-companies-tackle-cryptocurrency-theft-ransom-tracing.html
        11. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677850%2Fsecurity-by-design-vital-to-protecting-iot-smart-cities-around-the-world-says-ceo-of-uk-ncsc.html
        12. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677849%2Firans-nuclear-energy-agency-confirms-email-server-hacked.html
        13. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3676909%2Fwhen-cisos-are-doomed-to-fail-and-how-to-improve-your-chances-of-success.html
        14. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677270%2Fdont-neglect-saas-security.html
        15. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3677470%2Fiot-security-strategy-from-those-who-use-connected-devices.html
        16. https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html
        17. https://www.facebook.com/CSOonline
        Content length
        The webpage has 3,514 words.
        Text to HTML ratio
        The text to HTML ratio is 18%.
        Inline CSS
        The webpage contains inline CSS code.
        1. display:none;visibility:hidden
        2. color:#ffffff;text-decoration:none;
        3. background-image:url('https://images.idgesg.net/images/article/2019/08/cso_electronic_ticketing_international_travel_border_security_checkpoint_inspecting_personal_devices_by_ridofranz_gettyimages-842865122_virtual_security_check_by_natalya_burova_gettyimages-1097272864_2400x1600-100807823-large.3x2.jpg?auto=webp&quality=85,70');
        4. background-image:url('https://images.idgesg.net/images/article/2019/11/cso_detecting_phishing_attempts_magnifying_lens_by_chakisatelier_gettyimages-827302644_fish_hook_by_clker-free-vector-images_cc0_via_pixabay-100816822-medium.3x2.jpg?auto=webp&quality=85,70');
        5. background-image:url('https://images.idgesg.net/images/idge/imported/imageapi/2022/10/20/22/istock-147539280-100933728-medium.3x2.jpg?auto=webp&quality=85,70');
        6. display:none;
        7. display:none;
        8. display:none;
        9. display:none;
        10. display:none;
        11. width: 100%; height: auto; margin: 0 auto; display:block;
        12. display:none;
        13. display:none;
        14. display:none;
        15. display:none;
        16. display:none;
        17. display:none;
        18. display:none;
        19. display:none;
        20. display:none;
        21. display:none;
        22. display:none
        Deprecated HTML
        There are no deprecated HTML tags on the webpage.