Markets

Markets | News, how-tos, features, reviews, and videos

joe biden cyberceomeeting public domain wh
uk and south korea flags

targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

Online retailers should prepare for a holiday season spike in bot-operated attacks

On the naughty list this year are a host of bad actors employing a huge variety of different bot attacks that can have a big impact on retail websites. Fortunately, there are steps cybersecurity professionals can take to mitigate the...

india fallback generic shutterstock 2021954183

India drafts new privacy bill for transfer of personal data internationally

The central government has published a draft of data privacy laws, specifying penalties for security lapses, in order to invite feedback from the public.

3 security vendors

Build a mature approach for better cybersecurity vendor evaluation

Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.

mobile banking / financial network security / secure transactions/  bank card / credit card

PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules

New credit card payment processing rules will tighten security and offer more flexibility for enterprises. While they won’t come into full effect until 2025, experts say there are significant changes and recommend that consumer-facing...

conference / convention / audience / applause / clapping

The CSO guide to top security conferences

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Mondelez and Zurich’s NotPetya cyber-attack insurance settlement leaves behind no legal precedent

Mondelez International and Zurich American Insurance settled a keenly watched lawsuit over how cyberattack insurance applies to intrusions from nation states during wartime. A private agreement, its resolution sheds no light on how...

United States national government cybersecurity  >  Diverse hands surround/protect the U.S. Capitol.

GAO report: government departments need dedicated leaders to oversee privacy goals

A US Government Accountability Office report is calling for a host of changes to improve privacy within various federal agencies and departments. How those changes get implemented will depend largely on the establishment of new...

CSO > global security

Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC

UK National Cyber Security Centre’s Lindy Cameron calls for clear, workable international standards to improve the cybersecurity of the internet of things (IoT), connected devices, and smart cities.

CSO: Have you met these hackers? [slide 01]

Financial losses to synthetic identity-based fraud to double by 2024

Made-up financial identities will cause losses of nearly $2.5 billion, thanks to the prevalence of imposter scams.

Two developers collaborate on a project as they review code on a display in their workspace.

Malwarebytes pairs new MDR, EDR for overwhelmed cybersecurity teams

Malwarebytes MDR (managed detection and response) works by pairing EDR (end point detection and response) technology with a dedicated team of security analysts, providing both automated and human lines of defense.

us eu flag

EU-US data sharing agreement: Is it a done deal?

With both Privacy Shield and Safe Harbor having been previously struck down by legal challenges, experts question whether US President Biden’s executive order implementing the new Trans-Atlantic Data Policy Framework will stand up to...

cryptojacking / cryptocurrency attack

New cryptojacking campaign exploits OneDrive vulnerability

While currently the campaign is only involved in cryptojacking, it exploits DLL sideloading, which can be used to deploy spyware or ransomware.

USA / United States of America stars + stripes and binary code superimposed over The White House

US CISA reaches a new maturity level with its comprehensive strategic plan

The new plan aims to make the cybersecurity agency more efficient and to create a "whole of nation" approach to protecting the United States from cyberattacks.

U.S. dollar sign circuitry.

New US DHS grant program can boost local governments’ cybersecurity strength

The cybersecurity grant program is designed to initiate state and local governments projects but does not provide ongoing operating funds.

abstract collage of money with wall street finance

16 Wall Street firms fined $1.8B for using private text apps, lying about it

The banks and brokerages were fined because employees were messaging and texting with clients without recording the communications, as required. And some of the firms' execs lied about it and deleted messages.

Cybersecurity  >  locked binary code

Jamf buys ZecOps to bring high-end security to Apple enterprise

ZecOps protects world-leading enterprises, governments, and individuals; Jamf has acquired it to help secure the enterprise.

Wi-Fi_twilight_blur_800.jpg

Medical device vulnerability could let hackers steal Wi-Fi credentials

Vulnerabilities on battery units for medical infusion pump devices made by Baxter could allow for network access, DoS and man-in-the-middle attacks, highlighting IoT security issues and the need to properly decommission equipment,...

A user reviews data and statistical models. [analytics / analysis / tracking / monitoring / logging]

Top 12 managed detection and response solutions

These MDR services offer human and machine monitoring of your network to identify and respond to the most likely threats.

Load More
You Might Also Like