Advertisement

three global network puzzle pieces
Cybersecurity Snippets

3 XDR market challenges

XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.


securit logo

SecurIT event for Aussie infosec pros goes virtual

The 2020 event will be held fully online, with presentations and interactive sessions.


untitled design 2

SecurIT 2020

Live Virtual Event

As enterprises forge deeper into the digital realm, managing risk and security become even more important for senior information technology and security executives. And in today’s global, multi-cloud, multi-generational workplace, there are risks in every corner – and the board wants to know what you are doing about it.

Advertisement

A conceptual representation of accessing username and password credentials.

Lack of multi-factor authentication worries Aussie CSOs more than COVID-19 malware

Surveys confirm that remote work has turned Australia’s corporate security priorities on their heads.


computer worm

Wormable DNS flaw endangers all Windows servers

The SIGRed vulnerability can spread malware across a network without user interaction. Microsoft has issued an urgent patch.


Google Cloud

Google Cloud steps up security and compliance for applications, government

New Google Cloud offerings Confidential VMs and Assured Workloads for Government provide in-process data encryption and the ability to restrict storage locations, respectively.


broken lock amid binary code and circuits

Critical flaw allows hackers to breach SAP systems with ease

SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.


An obscured password is displayed on a monitor.

5 best practices to secure single sign-on systems

Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.


cso ts analytics  by monsitj getty images 2400x1600

How to protect algorithms as intellectual property

Algorithms can now be considered trade secrets or even patent-worthy. Prevent them from being stolen by taking these security steps.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


Advertisement

hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.


ransomware attack

How to protect Windows networks from ransomware attacks

Even large companies like Honda can fall victim to a targeted ransomware attack. Take these steps to harden your Windows network against them.


access control / authentication / privileges / security / key

Privilege escalation explained: Why these flaws are so valuable to hackers

Attackers use privilege escalation flaws to gain access to systems and applications. Patching and monitoring are the most important ways to stop them.


California Consumer Privacy Act  / CCPA  >  State flag / secured data

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.


iot security startups hot planets rocket lock security

15 hot tech skills getting hotter -- no certification required

Employers are apt to invest more often in cash premiums for noncertified tech skills compared to certifications. Here are a few they’re coveting the most now and going forward.