Advertisement
-
INSIDER
-
How Australia and New Zealand CISOs can get ahead of supply chain attacks
-
How CBA’s CISO transformed a disparate cybersecurity team
-
-
News
-
Google updates Chronicle to climb on managed detection and response train
-
Safe Security debuts two free risk assessment tools for businesses
-
-
How-ToView All
-
Windows Security Tips
-
Microsoft Defender for Business | What security admins need to know
-
Reviewing software risks on your Windows network
-
Google updates Chronicle to climb on managed detection and response train
Google Cloud’s Chronicle security analysis service will now offer managed detection and response (MDR) features, in order to compete with incumbents in the marketplace.
Ransomware safeguards for small- to medium-sized businesses
Following these 40 safeguards from the Institute for Security and Technology will help protect SMBs from ransomware and other malware attacks.
Advertisement
"Evil PLC Attack" weaponizes PLCs to infect engineering workstations
Researchers demonstrate a proof of concept where hijacked programmable logic controllers can compromise engineering workstations to allow lateral movement.
Safe Security debuts two free risk assessment tools for businesses
Organizations can gauge their cybersecurity risk factors by using Safe Security’s new online calculators.
Exposed VNC instances threatens critical infrastructure as attacks spike
Threats surrounding Virtual Network Computing laid bare as attacks targeting critical infrastructure increase.
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
VEX adds context to software vulnerabilities to better inform risk assessment decisions.
The 12 biggest data breach fines, penalties, and settlements so far
Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $4.2 billion and counting.
3 ways China's access to TikTok data is a security risk
The security community weighs in on real-world scenarios in which China or other nations could operationalize data collected by online platforms and how to mitigate the risk.
Top 5 security risks of Open RAN
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
Advertisement
New exploits can bypass Secure Boot and modern UEFI security protections
Two research groups demonstrate PC firmware vulnerabilities that are difficult to mitigate and likely to be exploited in the wild.
The CSO guide to top security conferences, 2022
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
Top cybersecurity products unveiled at Black Hat 2022
Here are some of the most interesting new products launched at Black Hat USA 2022, including zero trust, extended detection and response (XDR), and a host of other threat and vulnerability management offerings.
Network mistakes, misconfigurations cost companies millions
Titania research pegs losses from misconfigurations at average of 9% of annual revenue.
What happened to the Lapsus$ hackers?
Despite using methods that are "bold, illogical, and poorly thought out, Lapsus$ has successfully breached companies like Microsoft, Vodafone and Nvidia.
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by FortinetThe increasing role of digital twins and decoys in evading cybersecurity
-
Sponsored by Akamai and TelstraThe Cyberwar Against Pro-Ukrainian Countries Is Real. Here’s What to Do.
-
Sponsored by CSO OnlineCSO Security Summit Melbourne November 22nd