Advertisement
- Don't Miss:
- CSO50 2022 Award Winners
- CSO Hall of Fame honorees
How training and recognition can reduce cybersecurity stress and burnout
Cybersecurity professionals suffering from stress and burnout can be less productive, more prone to mistakes, and increasingly likely to quit. With the right training and recognition, CISOs can reduce stress and burnout in their teams....
Splunk adds new security and observability features
New security and observability features will be added to Splunk Mission Control and its Observability Cloud to identify threats and incidents more efficiently, the company said.
55 zero-day flaws exploited last year show the importance of security risk management
Cybercriminals are now exploiting zero-day vulnerabilities for higher profits, which might require a reassessment of your risk.
Advertisement
Landmark UK-Israeli agreement to boost mutual cybersecurity development, tackle shared threats
The 2030 Roadmap for Israel-UK Bilateral Relations promises ongoing cooperation in tackling cyberthreats, governing global cyberspace, developing cybersecurity skills, and investing in the cybersecurity ecosystem.
Average enterprise storage/backup device has 14 vulnerabilities, three high or critical risks
State of Storage and Backup Security Report 2023 reveals significant gap in the state of enterprise storage and backup security compared to other layers of IT and network security.
Backslash AppSec solution targets toxic code flows, threat model automation
New cloud-native solution aims to address time-consuming, manual methods for discovering and mapping application code security risks.
Sharing sensitive business data with ChatGPT could be risky
ChatGPT and similar large language models learn from the data you put in — and there are big risks in sharing sensitive business information with AI chatbots.
Ping Identity debuts decentralized access management system in early access
A new decentralized identity management system from Ping Identity promises fewer headaches and more robust security.
As critical Microsoft vulnerabilities drop, attackers may adopt new techniques
As critical Microsoft software vulnerabilities decline, attackers will need to chain together less severe exploits to achieve code execution, elevate system privilege levels, and move around victim networks.
Developed countries lag emerging markets in cybersecurity readiness
Organizations in Asia-Pacific countries including Indonesia, the Philippines, Thailand, and India are generally more prepared for cyberattacks than their peers in more economically developed nations, according to a new Cisco report....
Advertisement
9 attack surface discovery and management tools
The main goal of cyber asset attack surface management tools is to protect information about a company’s security measures from attackers. Here are 9 tools to consider when deciding what is best for the business.
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises
ForgeRock is adding Enterprise Connect Passwordless to its Identity Platform to provide no-code and low-code approaches for enterprises to add passwordless authentication to their IT infrastructure.
CISA kicks off ransomware vulnerability pilot to help spot ransomware-exploitable flaws
The CISA pilot program will notify organizations of vulnerabilities that can lead to ransomware attacks, with small organizations the primary beneficiaries.
BianLian ransomware group shifts focus to extortion
The shift in the operating model comes as a result of Avast’s release of a decryption tool that allowed a victim of the BianLian ransomware gang to decrypt and recover their files without paying the ransom.
7 guidelines for identifying and mitigating AI-enabled phishing campaigns
Phishing has always been a thorn in the side of enterprise cybersecurity, and recent AI developments such as ChatGPT are making things even worse. Here are some guidelines for dealing with the increasingly sophisticated phishing...
From Our Advertisers
-
Featured Sponsor IntelCompetitive Advantage with a Modern Data Center that Delivers Boundless Agility
-
Sponsored by CyberArkWhy the phishing blame game misses the point
-
Sponsored by Microsoft SecurityCloud security is incomplete without hybrid and multicloud coverage
-
Sponsored by CiscoStop the Sprawl: How Vendor Consolidation Can Reduce Security Risks in the