Advertisement
-
INSIDER
-
Defending quantum-based data with quantum-level security: a UK trial looks to
-
9 top identity and access management tools
-
-
News
-
Smart factories unprepared for cyberattacks
-
SQL injection, XSS vulnerabilities continue to plague organizations
-
-
How-To
-
How to mitigate Active Directory attacks that use the KrbRelayUp toolset
-
How to audit Microsoft Active Directory
-
-
CSO EXECUTIVE SESSIONS / ASEAN
-
Certis’s Lim Shih Hsien on the security sector
-
How Mox Bank’s David Walker is building customer trust through security by
-
Certis’s Lim Shih Hsien on the security sector
Lim Shih Hsien – Head of Technology Masterplanning and Security, CISO, and CSO at Certis – joins Xiou Ann Lim for this CSO Executive Sessions interview.
Attacker groups adopt new penetration testing tool Brute Ratel
APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.
Smart factories unprepared for cyberattacks
Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.
Advertisement
NIST names new post-quantum cryptography standards
One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.
What is decentralized identity?
Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...
How to keep attackers from using PowerShell against you
New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.
APT campaign targeting SOHO routers highlights risks to remote workers
The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.
SQL injection, XSS vulnerabilities continue to plague organizations
Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.
LockBit explained: How it has become the most popular ransomware
Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.
6 signs your IAM strategy is failing, and how to fix it
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.
Advertisement
Asia could be placing all the wrong cybersecurity bets
Only 12% of companies in Asia quantify their financial exposure to cyber threats, less than half the global average of 26% according to a recent study by Microsoft and Marsh.
Zero-day flaw in Atlassian Confluence exploited in the wild since May
Atlassian has issued emergency patches for the vulnerability, which could allow attackers to perform remote code execution.
11 top cloud security threats
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.
Security Recruiter Directory
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
Google Cloud previews advanced new API security features
Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.
From Our Advertisers
-
Featured SponsorCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by NetscoutDeploy NDR to Modernize Your Cybersecurity Strategy
-
Sponsored by Hillstone NetworksSD-WAN and Cybersecurity: Two Sides of the Same Coin