Features

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa
a hooded figure targets a coding vulnerability

Dustin White, chief risk data officer, Visa

How Visa fights fraud

The financial services company has made massive investments in data and analytics to better detect and prevent fraud.

binary neural network - artificial intelligence - machine learning

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

rocket launch startup cloud success growth badge

Security startups to watch for 2022

Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.

API security alert / software development / application flow chart diagram

How the Secure Software Factory Reference Architecture protects the software supply chain

This breakdown of the Cloud Native Computing Foundation's secure software factory guidance focuses on software provenance and build activities.

Compliance

How Microsoft Purview can help with ransomware regulatory compliance

Microsoft's renamed compliance portal provides guidance and rule-setting capability to help comply with ransomware and other security and privacy requirements.

Quantum computing / security

Defending quantum-based data with quantum-level security: a UK trial looks to the future

Telecommunications giant BT is testing secure quantum data transmission over a network in what could be a glimpse into the shape of things to come for cybersecurity in a quantum computing world

lock, data, binary code

Cybersecurity researchers face real-life threats

Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.

hacker / cryptocurrency attack

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

Recruiter attracts leads  >  Using a horseshoe magnet on a group of figurines.

6 tips for effective security job postings (and 6 missteps to avoid)

With demand for security professionals outstripping supply, employers need to ensure their job postings hit the mark. Here’s how to write a security job posting that attracts qualified candidates.

conference / convention / audience / applause / clapping

The CSO guide to top security conferences, 2022

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

rules rulebook letters compliance regulation by alex ishchenko getty

Sigma rules explained: When and how to use them to log events

Sigma rules allow you to detect anomalies in log events and identify suspicious activity.

software automation gears robotic code by mazimusnd getty and bill oxford via unsplash 2400x1600

For one software maker, an SBOM adds value to the product

At Instant Connect, an SBOM has become part of the product offering, says Chief Product Officer Wes Wells.

banana peel slip accident mistake fall by rapideye getty

Vulnerability management mistakes CISOs still make

These common missteps and misconceptions may be keeping your vulnerability management from being the best it can be.

job search machine learning ai artifical intelligence robotics automation

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

CSO  >  What is a computer virus?

9 types of computer virus and how they do their dirty work

From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.

certification programmer binary laptop devops by pixabay

Sigstore explained: How it helps secure the software supply chain

The free sigstore signing service helps developers establish provenance and integrity of open-source software.

binary code, magnifying lens, skull and crossbones

11 infamous malware attacks: The first and the worst

Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.

Load More