Advertisement

SAP

Install latest SAP Adaptive Server Enterprise patches, experts urge

If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers.


A rusty old lock hangs open amid the flow of binary code.

Skipped patch from 2012 makes old Microsoft Office systems a favored target

Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.


Patch + update options  >  Pixelized tools + refresh symbol with branching paths

Cloud infrastructure operators should quickly patch VMware Cloud Director flaw

Left unpatched, this command injection flaw could allow attackers to take control of a virtualized cloud infrastructure.


Advertisement

User hands on a laptop keyboard have a digital overlay reflecting data/analytics/tracking.

Securonix SIEM as a service has behavior analytics baked in

Organizations that want to concentrate on finding and removing threats using advanced techniques like user and device analytics would find a perfect match in the Securonix SIEM.


scanning the internet malicious magnifying glass

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.


porting converting change update renew trees

8 ways to get more life out of an old SIEM

Can't update your old security information and event management system now? Use this advice to maintain its effectiveness.


keep out sign do not tresspass privacy authentication access barbed wire by tim husser getty

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure...


CSO  >  Antivirus symbol on binary background

PrintDemon vulnerability explained: Its risks and how to mitigate

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.


collaboration / strategy / teamwork / transformation

Rethinking collaboration: 6 vendors offer new paths to remote work

With the need for efficient collaboration tools exploding in recent months, a variety of companies hope to refine how those tools work and what they can do. We look at six now pushing the envelope.


popcorn security theater lock by madartzgraphics and dbreen via pixabay

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make...


Advertisement

cloud security expert casb binary cloud computing cloud security by metamorworks getty 100803072 or

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.


cso exectutive sessions 3000px x 3000px
CSO Executive Sessions

Episode 10: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 2

Podcast Episode 10: Listen now as Akamai CISO Andy Ellis and host Bob Bragdon continue their talk about the good guy/bad guy dynamic in the infosec community and why it can lead to being marginalized.


Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.


Keep third-party risk on your radar: Piggybacked deer, giraffe and cat balance on a tightrope.

Managing vendor and supply chain risk in a recession

The COVID-19 crisis is putting security vendors, especially startups, under severe pressure. Here's how to vet their financial stability and prepare for the worst.


A conceptual representation of accessing username and password credentials.

Hashcat explained: Why you might need this password cracker

Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins as well as criminals and spies.