Advertisement

GDPR / data privacy / protection

EU court invalidates Privacy Shield data transfer agreement

US companies receiving EU personal data under Privacy Shield will need to find a replacement legal mechanism, and the decision could affect data protection policies and procedures.


three global network puzzle pieces
Cybersecurity Snippets

3 XDR market challenges

XDR is a promising concept, but XDR vendors face deployment challenges and competition on several fronts.


securit logo

SecurIT event for Aussie infosec pros goes virtual

The 2020 event will be held fully online, with presentations and interactive sessions.


Advertisement

untitled design 2

SecurIT 2020

Live Virtual Event

As enterprises forge deeper into the digital realm, managing risk and security become even more important for senior information technology and security executives. And in today’s global, multi-cloud, multi-generational workplace, there are risks in every corner – and the board wants to know what you are doing about it.

A conceptual representation of accessing username and password credentials.

Lack of multi-factor authentication worries Aussie CSOs more than COVID-19 malware

Surveys confirm that remote work has turned Australia’s corporate security priorities on their heads.


Access control: A laptop displays an 'access granted' alert.

Protect your Windows network from excessive administrator rights

Every developer or user on your network with administrative privileges adds risk of account compromise. Review privileges and take these steps to better manage Windows network access rights.


Google Cloud

Google Cloud steps up security and compliance for applications, government

New Google Cloud offerings Confidential VMs and Assured Workloads for Government provide in-process data encryption and the ability to restrict storage locations, respectively.


broken lock amid binary code and circuits

Critical flaw allows hackers to breach SAP systems with ease

SAP NetWeaver Application Server Java vulnerability can be exploited without authentication and lead to complete system takeover. Patch now.


An obscured password is displayed on a monitor.

5 best practices to secure single sign-on systems

Don't assume that SSO is inherently secure. Follow these recommendations to prevent unauthorized access due to authentication flaws.


cso ts analytics  by monsitj getty images 2400x1600

How to protect algorithms as intellectual property

Algorithms can now be considered trade secrets or even patent-worthy. Prevent them from being stolen by taking these security steps.


Advertisement

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


hacker / cryptocurrency attack

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.


ransomware attack

How to protect Windows networks from ransomware attacks

Even large companies like Honda can fall victim to a targeted ransomware attack. Take these steps to harden your Windows network against them.


access control / authentication / privileges / security / key

Privilege escalation explained: Why these flaws are so valuable to hackers

Attackers use privilege escalation flaws to gain access to systems and applications. Patching and monitoring are the most important ways to stop them.


California Consumer Privacy Act  / CCPA  >  State flag / secured data

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.