Advertisement
More top stories
Security Recruiter Directory
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Google Cloud previews advanced new API security features
Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.
How you handle independent contractors may determine your insider threat risk
Outside experts can be willing or accidental security threats. Reduce that risk by changing how you onboard, train and offboard them.
Advertisement
Key takeaways from CSA’s SaaS Governance Best Practices guide
Security and governance policies and practices are failing to keep up with the growth of SaaS usage. The Cloud Security Alliance's guidance aims to get that back on track.
SolarWinds creates new software build system in wake of Sunburst attack
Lessons learned from software supply chain breach lead to innovative and secure development scheme.
Google Cloud gets new built-in security features
MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.
Sysdig Secure update adds ability to stop container attacks at runtime
Sysdig's Drift Control detects and stops attempts to run packages or binary files that were added or modified at runtime.
Why more zero-day vulnerabilities are being found in the wild
With the number of zero-days spiking in the last 18 months, organizations need to increase their patching efforts. Software vendors can be more transparent, too.
How and why threat actors target Microsoft Active Directory
New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.
Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says
Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.
Advertisement
Microsoft's Defending Ukraine report offers fresh details on digital conflict and disinformation
Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."
Russia-China cybercriminal collaboration could “destabilize” international order
Russian cybercrime groups are courting their Chinese counterparts potentially could scale up the capabilities of both.
Adversarial machine learning explained: How attackers disrupt AI and ML systems
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.
How Visa fights fraud
The financial services company has made massive investments in data and analytics to better detect and prevent fraud.
Security startup Cerby debuts with platform to manage shadow IT
The Cerby system automates and streamlines the detection and protection of "unmanageable" applications, providing a platform that centralizes application enrollment, access and monitoring.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by FortinetFour Key Ways CISOs can Strengthen OT Security
-
Sponsored by Microsoft SecurityWhat Every Enterprise Can Learn from Russia’s Cyber Assault on Ukraine
-
Sponsored by CrowdStrikeSo You Want To Defend Your Cloud… Agentless or Agent-based, Which Approach Is