Advertisement

SMS phishing / smishing  >  Mobile phone displays text bubble with skull + crossbones

PIXM releases new computer vision solution for mobile phishing

PIXM Mobile uses computer vision tech to identify and stop phishing attacks on mobile devices in real time, as a user clicks on a malicious link.


Ransomware

Chaos ransomware explained: A rapidly evolving threat

The Chaos ransomware builder, now rebranded as Yashma, is quickly improving and being adopted by cybercriminal groups.


female developer programmer devops next generation it staff

New Mend service auto-detects and fixes code, app security issues

Mend, formerly WhiteSource, announces new service designed to detect and fix code security issues, reduce the software attack surface and application security burden.


Advertisement

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Patching the latest Active Directory vulnerabilities is not enough

Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities.


A gavel rests on open law book. [law / regulation / compliance / legal liability]

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.


modern server room with server racks in data center picture id1186291565

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.


it leader it professional engineer technician in network server room data center by antonio diaz sh

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.


Automation/machine learning/artificial intelligence >  mind-gears within circuit-board silhouette

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.


A vast network of identity avatars. [identity management]

IDaaS explained: How it compares to IAM

IDaaS is a cloud-based consumption model for IAM. It offers cost, scalability, and other advantages, but it also comes with its own risks.


A man with his head in his hands amid abstract security contruct.

Lessons learned from Nine’s ransomware nightmare

Nine CITO Damian Cronan and group director of IT security Celeste Lowe talk about the cyberattack and what changed at the organisation after.


Advertisement

5 cryptography and data protection

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.


CSO slideshow - Insider Security Breaches - Flag of China, binary code

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.


conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.


risk assessment - challenge - danger

Enterprises report rise in risk events, yet risk management lags

More threats to data, privacy are the top concerns of risk managers and are becoming “the new normal.”


A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.