Advertisement

Binary flag of the European Union viewed through a magnifying lens and showing a ripple effect.

EU takes aim at ransomware with plans to make Bitcoin traceable, prohibit anonymity

The European Commission has set out new legislative proposals to make crypto transfers more traceable. While the plans will close some existing loopholes, the impact on cybercrime is likely to be minimal, experts say.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.


A gavel rests on open law book. [law / regulation / compliance / legal liability]

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.


Advertisement

security trust

Secure multiparty computation explained: Ensuring trust in untrustworthy environments

Secure multiparty computation is a collection of algorithms that allow people to work together over a network to find a consensus or compute a value and have faith that the answer is correct. Everyone contributed fairly and there was...


An unknown number calls a mobile phone amid pixelated data.

Scammers’ Australian windfall bodes poorly for cybersecurity’s human defences

Company culture is the soft underbelly that scammers can exploit, using the same techniques to access corporate data which fool employees in their personal lives.


A vault door security mechanism with abstract circuits. / increase security / harden against attacks

Best Mitre D3FEND advice to harden Windows networks

Mitre's recently released D3FEND matrix offers sound guidance for any security admin or CISO looking to harden a Windows network against attack.


A binary map of china.

Biden administration, US allies condemn China's malicious hacking, espionage actions

Global coalition calls on China to curtail its cyber activities. For the first time, the US blames China directly for ransomware attacks.


A lost businessman wanders amid conflicting directional signs through the fog.

8 biases that will kill your security program

CISOs and their security teams often hold cognitive biases that get in the way of making the right risk management and incident response decisions. Here are eight of the most common to avoid.


google cloud ciso phil venables on the future of cloud security

Google Cloud CISO Phil Venables on the future of cloud security

Can cloud providers help lift security's burden of endless compliance checklists and certifications?


A laptop displays binary code and the flag of China.

US charges four suspected Chinese spies who coordinated APT40 hackers

The government outlines how APT40 conducted its Microsoft Exchange Server attack and offers advice to defend against nation-state threats.


Advertisement

virtual connections / social networking / remote teams

How long-term hybrid work is changing security strategies

CISOs across industries are revisiting the stopgap security tools and the temporary policies they enacted to quickly enable remote work to replace them with stronger permanent solutions. But the old rules no longer apply.


data analytics / risk assessment / tracking data or trends
Cybersecurity Snippets

Move over XDR, it's time for security observability, prioritization, and validation (SOPV)

Independent tools and data repositories are coming together for better threat management, impacting organizations, security professionals, and the industry. We need to take the same approach to security hygiene and posture management....


lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.


Cybersecurity  >  Email security threats, such as phishing

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.


resume typewriter cv career job search

6 resume mistakes CISOs still make

The top security job has evolved from a technology-focused role into an executive position. Does your resume reflect that shift?