Industry | News, how-tos, features, reviews, and videos

EU / European Union / GDPR data privacy protection, regulation, compliance
shutterstock 1869308242 team putting together a chain of gears teamwork coordination collaboration

conference / convention / audience / applause / clapping

The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

CSO  >  security shield / binary code / handshake / agreement / contract

IBM acquires Polar Security, bolstering data security capabilities

IBM’s purchase of Israel-based application data security startup Polar will see that company’s data security posture management technology integrated into IBM’s Guardium lineup of products.

EKG and stethoscope in a binary environment

How Northfield Hospital uses AI to minimize risk from cyberattacks

The rural community hospital has turned to AI-enabled protection to have full visibility of its network and understand the threat landscape.

office screen workers cybersecurity reporting concern

UK NCSC, ICO debunk 6 cyberattack reporting myths

These misconceptions, including the belief that paying a ransom makes the incident go away, could result in more attacks or bigger regulatory fines.

business cyber insurance

Insured companies more likely to be ransomware victims, sometimes more than once

A recent report found that companies with cyber insurance have been hit by ransomware more than those without it, and sometimes more than once. Although threat actors may not be directly correlating the insurance factor to find...

many keys on a series of keychains / key rings / binary code overlay / password management

The 6 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

mobile phone touchscreen in hands

Malwarebytes releases Mobile Security for OneView to secure Chromebooks, Android, iOS devices

Mobile security features for MSPs include anti-malware and malicious app protection.

A group discussion takes place around a table in an office workspace.

Small- and medium-sized businesses: don’t give up on cybersecurity

When the focus is often on the big hacking and ransomware cases involving multinational companies and governments, small- and medium-sized businesses can often feel left behind and powerless. But help is out there.

cloud technology protection information cybersecurity indentity

Review your on-prem ADCS infrastructure before attackers do it for you

Attacks through Active Directory Certificate Services are fairly easy for bad actors to perform but basic vigilance and built-in Windows protections can help mitigate the risk of a breach.

business cyber insurance

The Merck appeal: cyber insurance and the definition of war

Pharmaceutical giant Merck’s won an appeal that might see it claim $1.4 billion from insurers due to the NotPetya ransomware attack. The decision hinged on the definition of war and it could also affect how insurance terms are defined...

artificial intelligence ai ml machine learning abstract

White House unveils AI rules to address safety and privacy

President Biden's rules are not legally binding, but they do offer guidance and begin a conversation at the national level about real and existential threats posed by generative AI technologies such as ChatGPT.

USA / United States of America stars + stripes and binary code superimposed over The White House

White House seeks information on tools used for automated employee surveillance

The information will be used to ascertain if employers are violating antitrust and privacy laws, including whether companies use technologies to artificially reduce wages.

OpenAI ChatGPT logo

ChatGPT returns to Italy after OpenAI tweaks privacy disclosures, controls

OpenAI has relaunched ChatGPT in Italy after making changes requested by the country's data privacy regulator.

corporate security insider threat hacker spy cybersecurity human resources

Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators

The US National Security Agency and CISA have published a set of guidelines to help secure systems from access- and identity-based threats. Here’s what to look for in this wide-ranging document.

margrethe vestager google shopping, EU

Amazon, Facebook, Twitter on EU list of companies facing DSA content rules

The EU Commission has announced the 19 online companies and search engines, including Bing and Google, that will have to comply with new transparency and accountability regulations by August.

Unexpected obstacles/disaster preparedness > A toy knight defends against a descending sneaker

Accenture, IBM, Mandiant join Elite Cyber Defenders Program to secure critical infrastructure

Led by Nozomi Networks, the program aims to provide global industrial and government customers cybersecurity defense tools, incident response teams, and threat intelligence.

01 intro crowd conference

Most interesting products to see at RSA Conference 2023

These are the tools, platforms, and services that the CSO team recommends RSA Conference attendees check out.

Cybersecurity  >  Email security threats, such as phishing

Abnormal Security expands threat protection to Slack, Teams and Zoom

The new tools include message security, account takeover protection, and security posture management for cloud communication applications to protect against multi-channel threats.

Load More
You Might Also Like