Advertisement

noops code developer devops html web developer by mazimusnd getty

SBOM formats SPDX and CycloneDX compared

Understanding the differences between these widely used software bill of materials format standards is important, but your tools will likely need to support both.


keeping the cloud secure cloud security lock padlock private cloud

AWS, Google Cloud, and Azure: How their security features compare

Each cloud platform differs in the security tools and features it offers customers to help them protect their cloud assets.


big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.


Advertisement

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

Palo Alto debuts Unit 42 team for managed detection and response

Live expert service builds on Palo Alto’s Cortex extended detection and response (XDR) platform provide, offering a managed detection and response (MDR) team for more personalized cybersecurity management and incident response.


Microsoft logo

Microsoft boosts threat intelligence with new Defender programs

Drawing from its acquisition of RiskIQ, Microsoft is releasing Defender External Attack Surface Management and Defender Threat Intelligence.


government cios without authority washington columns executives

The Secret Service’s missing text messages: Lessons for IT security

The drama in Washington shines a light on the challenges in securing mobile communications and the role that document destruction and retention policies play in organizational security.


hand reaching out to folders and files

Deep Instinct’s Prevention for Applications detects malicious files in transit

The new antimalware software scans files in transit to protect organizations against malicious content in PDF and Word documents.


Computerworld - Scary Tech [Slide-02] - IoT that’s always listening

China, Huawei, and the eavesdropping threat

In the world of intelligence, “capability present” changes the conversation from if to when. Huawei is an espionage threat not because of what it has done but because of what it can do.


Red team  >  Double-exposure with team, cityscape + abstract data / teamwork / collaboration

11 stakeholder strategies for red team success

These best practices will help ensure a successful red team exercise by getting all the stakeholders on the same page.


Handshake, mergers and acquisitions, M &A

Thoma Bravo snares Ping Identity in $2.8 billion go-private deal

Private equity firm Thoma Bravo announced plans to purchase IAM (identity and access management) provider Ping Identity, its latest in a lengthy line of security-focused mergers and acquisitions.


Advertisement

cloud security

Qualys adds external attack management capability to cloud security platform

Integration of EASM (external attack surface management) into Qualys CSAM (cybersecurity asset management) offers enterprises continuous discovery and classification of both internal and external assets.


FireMon network security policy management

Tips to prevent RDP and other remote attacks on Microsoft networks

Microsoft is deploying new features and defaults to help keep threat actors from remotely accessing networks, but you can do more.


Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 best practices for secure collaboration

How successful companies are facing the challenges of securing emerging communication technologies.


zero trust

Axis adds automation, onboarding features to Atmos ZTNA network access software

Axis is also offering migration tools and a buyback program for those looking to move from legacy ZTNA (zero trust network access) applications.


CSO > IoT / Internet of Things, unencrypted/unsecured/vulnerable

Opsera’s GitCustodian detects vulnerable data in source code

The DevOps orchestration vendor’s new SaaS offering scans source code repositories for sensitive data and alerts teams to prevent that data leaking into production.