Advertisement
The SolarWinds hack timeline: Who knew what, and when?
Impact, detection, response, and ongoing fallout from the attack on SolarWinds' Orion remote IT management software.
Security Recruiter Directory
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Hacking 2FA: 5 basic attack methods explained
As two-factor authentication becomes more widespread, criminals seek novel ways to subvert it. Here's what you need to know.
Advertisement
Top cybersecurity M&A deals for 2021
The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.
17 cyber insurance application questions you'll need to answer
Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.
What are phishing kits? Web components of phishing attacks explained
A phishing kit is the back-end to a phishing attack. It's the final step in most cases, where the criminal has replicated a known brand or organization.
Defining linchpins: An industry perspective on remediating Sunburst
The concept of linchpin software can be useful in assessing risk and focusing security efforts, but it comes with challenges.
How cybercriminals turn ‘harmless’ stolen or leaked data into dollars
By merging data from multiple sources, cybercriminals can build profiles of hacked account owners to enable other attacks or increase the effectiveness of social engineering campaigns.
HITRUST explained: One framework to rule them all
HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
6 most common types of software supply chain attacks explained
Not all software supply chain attacks are the same. Here are the methods attackers currently use to corrupt legitimate software through third parties.
-
-
eBook
Sponsored -
Data Sheet
Sponsored -
Case Study
Sponsored
Advertisement
SolarWinds attacker Nobelium targets over 150 companies in new mass email campaign
The Russian state-sponsored group has shifted to targeted email attacks that exploit third-party services.
TSA’s pipeline cybersecurity directive is just a first step experts say
The new, hastily announced security directive requires US pipeline companies to appoint a cybersecurity coordinator and report possible breaches within 12 hours.
CIO Think Tank Roadmap Report: Reinventing IT
As companies accelerate out of pandemic disruption, how can IT meet increasing demands — and reap unprecedented benefits? In a series of virtual roundtables, dozens of IT leaders offered key insights about the road ahead.
New US CISO appointments, May 2021
Keep up with news of CSO, CISO and other senior security executive appointments.
Credential stuffing explained: How to prevent, detect, and defend against it
Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts.
From Our Advertisers
-
Featured Sponsor IDG Tech(Talk) CommunityEngage with thousands of your peers on tech developments while earning rewards
-
Sponsored by FortinetDriving Digital Innovations and High Performance On and Off the Race Track
-
Sponsored by SophosChanging the Narrative Around Attack Victim Shaming
-
Sponsored by ExtraHopThe Importance of Network Data in Cloud Workload Security




