Dan Swinhoe

Dan Swinhoe is a journalist at CSO Online. Previously he was Senior Staff Writer at IDG Connect.

Why security needs to be involved early during mergers and acquisitions

Shared SIEM helps 3 UK local governments avoid outsourcing security

Shared SIEM helps 3 UK local governments avoid outsourcing security

A single SIEM serves three UK councils, allowing for solution consolidation that saves costs while improving efficiency and regulatory compliance.

How a data-driven approach to security helps a small healthcare team embrace automation

How a data-driven approach to security helps a small healthcare team embrace automation

Not-for-profit Martin's Point Health Care created a data-driven security framework to automate how threats are evaluated.

Wipro breach highlights third-party risk from large IT services providers

Wipro breach highlights third-party risk from large IT services providers

After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk.

How OneLogin responded to its breach and regained customer trust

How OneLogin responded to its breach and regained customer trust

After its second incident in less than 12 months, incoming OneLogIn CEO Brad Brooks saw the need to instill a security-first mindset in the company and relay that message to wary customers.

New TajMahal APT discovered by Kaspersky has one known victim, likely others

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once.

How threat intelligence sharing can improve the security posture of whole industries

How threat intelligence sharing can improve the security posture of whole industries

UBS and industry peers conduct joint cyber war games to improve security posture and incident response of the whole sector.

Security technologies that provide the most savings

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization.

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks.

How hackers use ransomware to hide data breaches and other attacks

How hackers use ransomware to hide data breaches and other attacks

Most ransomware is used simply to make money. However, it can also be used as part of an attacker’s exit strategy to wipe out forensic evidence of a more serious breach.

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iran-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits.

How to report a data breach under GDPR

How to report a data breach under GDPR

Data breach notification requirements are now mandatory and time-sensitive under GDPR. Here's what you need to report and who report it to.

Load More