Advertisement
- Don't Miss:
- CSO50 2022 Award Winners
- CSO Hall of Fame honorees
More top stories
Qualys previews TotalCloud FlexScan for multicloud security management
Agentless security management system aims to simplify vulnerability management for security teams and developers in cloud and hybrid cloud environments.
Geopolitics plays major role in cyberattacks, says EU cybersecurity agency
State-sponsored threat actors have targeted 128 government organizations in 42 countries that support Ukraine, as ransomware and DDoS rank as top forms of cyberattacks, says the EU Agency for Cybersecurity (ENISA).
New US CISO appointments, September 2022
Keep up with news of CSO, CISO, and other senior security executive appointments.
Advertisement
The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent
Mondelez International and Zurich American Insurance settled a keenly watched lawsuit over how cyberattack insurance applies to intrusions from nation states during wartime. A private agreement, its resolution sheds no light on how...
Espionage campaign loads VPN spyware on Android devices via social media
Attackers built a fake online community and used a malicious VPN app to steal credentials and other user data.
White House ransomware summit highlights need for borderless solutions
Representatives from 36 countries and the EU agree that combatting ransomware requires international collaboration but legal systems need to catch up.
Making the case for security operation automation
Most organizations are automating security operations processes and achieving benefits. An intelligent strategy and appropriate technology decisions can accelerate these projects.
Azul detects Java vulnerabilities in production apps
Azul Vulnerability Detection promises to eliminate false positives without impacting performance, by drawing on monitoring and detection capabilities inside the Azul JVM.
GAO report: government departments need dedicated leaders to oversee privacy goals
A US Government Accountability Office report is calling for a host of changes to improve privacy within various federal agencies and departments. How those changes get implemented will depend largely on the establishment of new...
Advertisement
Netacea launches malicious bot intelligence service to help customers tackle threats
Vendor says new service will offer insights into bot security threats and remediation advice based on marketplace research and dark web chatter.
How to securely manage LAPS on a Windows network
Microsoft’s Local Administrator Password Solution (LAPS) enables local admin passwords to be set, reset and validated periodically. Here is how to make the best use of LAPS.
OpenSSL project patches two vulnerabilities but downgrades severity
The two vulnerabilities in OpenSSL 3.0 are now rated as high rather than critical severity after further testing.
The OSPO – the front line for secure open-source software supply chain governance
An open-source program office (OSPO) can act as both gatekeeper and evangelist in an organization’s struggle to ensure ubiquitous open-source components – incredibly useful but vulnerable to bad actors and misuse – are deployed safely...
Engineering workstation attacks on industrial control systems double: Report
Some of the biggest challenges faced in securing industrial control systems involve integrating legacy and aging operational technology with modern IT systems.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by WatchGuardWhy to Rely on an MSP for Security — and How to Pick the Right One
-
Sponsored by DevoNew SOC Performance Report: Security Analysts Are Overworked and Under
-
Sponsored by Microsoft Security#BeCyberSmart All Year Round With Educational Resources from Microsoft



