Advertisement

cloud computing / cloud network

Qualys previews TotalCloud FlexScan for multicloud security management

Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.


Flag of the European Union as part of a broken, cracked wall.

Geopolitics plays major role in cyberattacks, says EU cybersecurity agency

State-sponsored threat actors have targeted 128 government organizations in 42 countries that support Ukraine, as ransomware and DDoS rank as top forms of cyberattacks, says the EU Agency for Cybersecurity (ENISA).


Conceptual image of a network of executives / silhouettes of executives in motion.

New US CISO appointments, September 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.


Advertisement

conference / convention / audience / applause / clapping

The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


lawsuit judge law court decision sued money 100614067 orig copy

Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent

Mondelez International and Zurich American Insurance settled a keenly watched lawsuit over how cyberattack insurance applies to intrusions from nation states during wartime. A private agreement, its resolution sheds no light on how...


diversity south africa man holding smartphone mobile technology connected by peopleimages gettyimag

Espionage campaign loads VPN spyware on Android devices via social media

Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.


global meeting conference international business

White House ransomware summit highlights need for borderless solutions

Representatives from 36 countries and the EU agree that combatting ransomware requires international collaboration but legal systems need to catch up.


gears orange large efficient automated machine learning automation

Making the case for security operation automation

Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects.


Digital bugs amid binary code. [security threats / malware / breach / hack / attack]

Azul detects Java vulnerabilities in production apps

Azul Vulnerability Detection promises to eliminate false positives without impacting performance, by drawing on monitoring and detection capabilities inside the Azul JVM.


United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

GAO report: government departments need dedicated leaders to oversee privacy goals

A US Government Accountability Office report is calling for a host of changes to improve privacy within various federal agencies and departments. How those changes get implemented will depend largely on the establishment of new...


Advertisement

bunch of toy robots

Netacea launches malicious bot intelligence service to help customers tackle threats

Vendor says new service will offer insights into bot security threats and remediation advice based on marketplace research and dark web chatter.


password

How to securely manage LAPS on a Windows network

Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.


Patch + update options  >  Pixelized tools + refresh symbol with branching paths

OpenSSL project patches two vulnerabilities but downgrades severity

The two vulnerabilities in OpenSSL 3.0 are now rated as high rather than critical severity after further testing.


protective shield / binary code / COVID-19 coronavirus morphology

The OSPO – the front line for secure open-source software supply chain governance

An open-source program office (OSPO) can act as both gatekeeper and evangelist in an organization’s struggle to ensure ubiquitous open-source components – incredibly useful but vulnerable to bad actors and misuse – are deployed safely...


abstract industrial iot internet of things

Engineering workstation attacks on industrial control systems double: Report

Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.