Advertisement
- Don't Miss:
- CSO50 2022 Award Winners
- CSO Hall of Fame honorees
More top stories
The CSO guide to top security conferences
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
Researchers found security pitfalls in IBM’s cloud infrastructure
A demonstrated attack by cybersecurity researchers in IBM’s cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.
Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
Cybersecurity researchers found risks in the GitHub Actions platform that could enable attackers to inject malicious code into software projects and initiate a supply chain attack.
Advertisement
8 things to consider amid cybersecurity vendor layoffs
Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.
Fortanix unveils AWS integration for centralized key management
Multicloud users have a new option for encryption key management across platforms, with the news that Fortanix has now integrated AWS support.
AWS' Inspector offers vulnerability management for Lambda serverless functions
AWS announces new cybersecurity features in Amazon Inspector and Amazon Macie at AWS Re:Invent 2022 in Las Vegas.
AWS launches new cybersecurity service Amazon Security Lake
The service automatically centralizes security data from cloud and on-premises sources into a purpose-built data lake in a customer’s AWS account.
5 top qualities you need to become a next-gen CISO
The world of cybersecurity changes quickly. If you want to be at the top of your game, a next-generation (“next-gen” in IT-speak) CISO, you should consider these guidelines for building and maintaining the skills and relationships...
What is Ransom Cartel? A ransomware gang focused on reputational damage
The group combines data encryption with data theft and threatens to release stolen information on their website. But Ransom Cartel ups its game by threatening to send sensitive information to victim’s partners, competitors, and news...
How to build a public profile as a cybersecurity pro
High-profile cybersecurity professionals share their paths, tips, and learnings for those interested in creating a personal brand.
Advertisement
Financial services increasingly targeted for API-based cyberattacks
API-based attacks are sharply on the rise, as cybercriminals take aim at the financial services industry, according to a new report from Akamai.
AWS releases Wickr, its encrypted messaging service for enterprises
The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.
Website offering spoofing services taken offline after joint operation
Law enforcement authorities in Europe, Australia and North America have arrested 142 people in connection with a website that allowed criminals to steal $120 million from victims that had fallen foul of spoofing campaigns.
EU Council adopts NIS2 directive to harmonize cybersecurity across member states
The NIS2 directive replaces NIS as EU Council seeks to improve resilience and incident response capacities in the EU.
500 million WhatsApp mobile numbers up for sale on the dark web
The seller claims to have data of users from over 84 countries, including US, UK, India, Egypt, Mexico and Russia.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by FortinetImproving Cyber Hygiene with Multi-Factor Authentication and Cyber Awareness
-
Sponsored by Juniper NetworksSASE: The Only Way to Improve Network Security Without Added Complexity
-
Sponsored by SophosThreat Notification Isn’t the Solution – It’s a Starting Point


