Michael Nadeau, CSOonline

Michael Nadeau

CSOonline

Salem, NH, United States

Contact Michael

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • CSOonline
  • CIO.com

Past articles by Michael:

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home. → Read More

Hottest new cybersecurity products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. → Read More

8 phishing emails and why you’ll fall for them (or not)

One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing. → Read More

13 data breach predictions for 2019

How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions. → Read More

State of cybercrime 2018: Security spending up, but so are the risks

IT and security management use more technology to defend against sophisticated hacker attacks, but still lag on security training. → Read More

7 unexpected ways GDPR and other privacy regulations make security harder

The GDPR and other privacy regulations are creating new opportunities for cyber criminals and roadblocks for security teams, while in some cases putting personal data at greater risk. → Read More

Identity eats security: How identity management is driving security

New intelligent identity management systems are changing the way organizations authenticate users and devices, and they’re making identity the new security perimeter. → Read More

Security and new technology: How one company faced the unknown

A move to a pure cloud strategy at the London Stock Exchange Group forced a new security mindset. Here's how the LSEG's CISO faced the challenge. → Read More

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan. → Read More

Data and privacy breach notification plans: What you need to know

Failure to report breaches within the rules of the many global data and privacy protection regulations can result in penalties. Planning ahead will help avoid that. → Read More

11 ways ransomware is evolving

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts. → Read More

Are you letting GDPR’s privacy rules trump security?

An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact. → Read More

5 biggest healthcare security threats for 2018

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. → Read More

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. → Read More

How to write a CISO job description

The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role. → Read More

Our top 7 cyber security predictions for 2018

Let’s face it: 2017 was a terrible year for cyber security with more phishing scams, ransomware, state-sponsored attacks, and new attack vectors. Will 2018 be better? → Read More

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation. → Read More

How to survive the worsening cyber threat landscape

Industry and government cybersecurity experts offer advice for protecting business assets and reputation in an increasingly dangerous cyber threat landscape. → Read More

How to secure the Industrial IoT: A Q&A with GE's CISO

Manufacturing giant GE takes a holistic approach to industrial internet of things (IIoT) security that integrates enterprise and product security. CISO Nasrin Rezai explains why this is important and how it works. → Read More

General Data Protection Regulation (GDPR) requirements, deadlines and facts

GDPR is a regulation that requires businesses to protect the personal data and privacy of EU citizens for transactions that occur within EU member states. And non-compliance could cost companies dearly. Here’s what every company that does business in Europe needs to know about GDPR. → Read More