Advertisement

COVID-19 coronavirus structures are layered amid statistical models.

Top COVID-19 security statistics

Here's what research reveals about how CISOs and their organizations responded to the pandemic and what they should do going forward.


Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Do you have a security tools gap?

Studies show that most CISOs think they have a security tools gap, but a deeper dive into the issue uncovers a much more complex dynamic.


A woman carefully studying survey data.

How Australian IT security pros responded to the COVID-19 crisis

Australian organisations fared better than their Asia-Pacific and global peers in many indicators, but Aussies also have lower expectations for IT and security investments, a survey finds.


Advertisement

CSO  >  security shield / binary code / handshake / agreement / contract

10 biggest cybersecurity M&A deals in 2020

COVID-19 hasn't slowed the pace of mergers and acquisitions for 2020, although the size of the transactions is down from last year.


handshake / teamwork / collaboration / partnership / deal / negotiation

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


risk assessment - safety analysis - security audit

EU's DORA regulation explained: New risk management requirements for financial firms

The proposed Digital Operational Resilience Act includes new incident response and third-party risk requirements for financial firms operating within the EU. Passage is expected, so plan now.


Ransomware  >  An encrypted system, held ransom with lock + chain, displays a dollar sign.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.


Dark net warning sign against black and yellow warning stripes in the background.
The State of Cybersecurity

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.


ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.


security risk - phishing / malware / social engineering

9 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit


Advertisement

bucket with holes security vulnerabilities breach insecure

6 security shortcomings that COVID-19 exposed

The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots.


Australia  >  Melbourne  >  Centre Place / streetscape / retail / shoppers / consumers / customers

Australian small businesses struggle with cybersecurity

University-linked survey highlights the difficulties small businesses face in understanding preventing, and remediating cyberattacks.


radar grid / computer circuits / intrusion detection / scanning
InfoSec at Your Service

5 open source intrusion detection systems for SMBs

If you don’t have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.


leaking binary data pouring through one's hands

Intel SGX users need CPU microcode patch to block PLATYPUS secrets-leaking attack

Attackers could use the vulnerability to access encryption keys from the Linux kernel's memory or Intel SGX enclaves.


A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]

Mercenary APT group CostaRicto hits organizations worldwide

This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.