Advertisement

Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.


CSO: Have you met these hackers? [slide 11]

DOJ: Good faith security research won’t be charged under Computer Fraud and Abuse Act

The U.S. Department of Justice revises its policy regarding charging violations of the CFAA. Good faith security research will no longer be charged.


big brother privacy eye data breach security binary valerybrozhinsky getty

Data protection concerns spike as states get ready to outlaw abortion

The use of personal data from brokers, apps, smartphones, and browsers to identify those seeking an abortion raises new data protection and privacy risks.


Advertisement

A vast network of identity avatars. [identity management]

IDaaS explained: How it compares to IAM

IDaaS is a cloud-based consumption model for IAM. It offers cost, scalability, and other advantages, but it also comes with its own risks.


5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.


CSO slideshow - Insider Security Breaches - Flag of China, binary code

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.


John DeSimone, president of Cybersecurity, Intelligence & Services, Raytheon Intelligence & Space

Raytheon’s John DeSimone on building the offensive line

Security teams need to become more proactive and go after malware, says DeSimone.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


risk assessment - challenge - danger

Enterprises report rise in risk events, yet risk management lags

More threats to data, privacy are the top concerns of risk managers and are becoming “the new normal.”


A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.


Advertisement

intro security vulnerability

Two account compromise flaws fixed in Strapi headless CMS

The vulnerabilities allow attackers to use a low-privilege account to reset the password of a higher-privilege account.


Encryption  >  A conceptual technological lock and encrypted code.

QuSecure launches end-to-end post-quantum cybersecurity solution

QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel.


Multiple-exposure shot of a clock and calendar pages. [time / past / future / history / what's next]

WannaCry 5 years on: Still a top threat

As security pros reminisce about the ransomware’s anniversary, some note the more things change, the more they stay the same.


binary highway

Uber CISO's trial underscores the importance of truth, transparency, and trust

The criminal trial offers a lesson in the value of both CISOs and organizations adhering to a policy of truth, transparency and trust when it comes to security.


https ssl certificate

How to choose a certificate management tool

Managing certificates that hold all your encryption secrets is impossible without the right tool. Here's how to narrow the field.