Advertisement

iot security startups hot highlights planets rocket lock security

8 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management,...


Ransomware  >  A masked criminal ransoms data for payment.

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.


bullseye hospital healhcare

Ransomware has put Australia’s hospital cybersecurity on life support

Just as one Australian hospital recovers, another is breached—an all too common story lately.


Advertisement

Conceptual image of three figures running toward a goal, along trend lines drawn by a large hand.

5 key qualities of successful CISOs, and how to develop them

CISOs today need significantly different skillsets to cybersecurity leaders of the past as they become more critical to business success.


One avatar is uniquely identified among others at the center of a bullseye in a digital environment.

8 top identity and access management tools

Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.


network security / secure connections / integrated system of locks
Cybersecurity Snippets

5 things CISOs want to hear about zero trust at the RSA Conference

Security executives are interested in how ZT vendors will integrate with existing technologies, supplement ongoing projects, and support business processes.


target threat hunting program sitting duck duck shooting gallery by roz woodward getty 2400x1600

Tips and tactics of today's cybersecurity threat hunters

Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.


backdoor / abstract security circuits, locks and data blocks

Previously undocumented backdoor targets Microsoft’s Equation Editor

RoyalRoad backdoor delivered via spear phishing was identified in an attack on a Russian-based defense contractor.


New York City / digital technology framework / binary code

To better defend digital assets, follow physical security's playbook

It’s high time that the owners and managers of corporate networks take the same approach and sense of urgency to protecting corporate digital assets that their physical security counterparts have taken with building security.


cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.


Advertisement

cloud security / data protection / encryption / security transition

6 tips for better collaboration between security and cloud teams

Good communication, mutual understanding of each team's goals, and proper processes and infrastructure will ensure an effective working relationship between cloud and security teams.


A firmware message appears on a circuit board.

3 ways to prevent firmware attacks without replacing systems

Use these Microsoft Windows and Office features to mitigate the risk from firmware attacks. They are faster and cheaper than replacing computers.


CSO > Invalidated cyber insurance

Buying cyber insurance in 2021? Expect greater scrutiny, higher premiums

Increased frequency of cyberattacks and growing associated costs could mean higher premiums, tighter risk assessments, and changes in coverage this year.


A 'GitHub social coding' mug sits in a desktop workspace.

15 open source GitHub projects for security pros

GitHub has a ton of open-source options for security professionals, with new entries every day. Add these tools to your collection and work smarter.


CSO: Have you met these hackers? [slide 07]

Hacktivism’s reemergence explained: Data drops and defacements for social justice

A record amount of leaked data to expose far-right groups signals a more focused and serious approach to hacking for a cause. To understand the risk, CISOs should pay attention to the news.