CSO staff and contributors tell what they hope or fear will happen in the infosec world for the coming year. Read More ▶ | | | BlackBerry's move into the endpoint security game may create public safety issues, given the company's love affair with encryption backdoors, experts say. Read More ▶ | | Supply chain is sexy again, and NIST hopes that means more companies take its supply chain risk guidance seriously. Read More ▶ | | | Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider. Read More ▶ | | The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. Read More ▶ | | Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted. Read More ▶ | | Can an immutable record and GDPR data subject rights co-exist? Why blockchain might not be able to deliver on data privacy requirements. Read More ▶ | | Editor's Picks | | | Get Security Smart From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more. | | | | |