Advertisement

A man and woman sit on opposite sides of an office desk, in discussion.

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.


Cyber insurance  >  Umbrella hub protecting connected devices + online activities in binary world.

Decline in ransomware claims could spark change for cyber insurance

New research indicates that ransomware attack and payment claims are in decline as resiliency takes priority for organizations.


API security alert / software development / application flow chart diagram

Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises

Researchers at Splunk outline a technique, pioneered by Salesforce, that could detect malicious activity in the software supply chain, but with some limitations.


Advertisement

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.


browser security

New Windows browser security options and guidance: What you need to know

Microsoft has added new Edge update options and enhanced browser security modes, including a beta Super Duper Secure Mode.


certificate / gold seal certification

(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages

New certification aims to validate knowledge of foundational cybersecurity concepts and best practices to address skills gap. Is another cybersecurity qualification the answer?


binary cyberattack cybersecurity hacked protected

SSRF attacks explained and how to defend against them

Server-side request forgery (SSRF) attacks consist of an attacker tricking the server into making an unauthorized request. Defending against them can be relatively easy.


Multi-factor authentication (MFA) / two-factor authentication (2FA) / one-time security code

8 top multifactor authentication products and how to choose an MFA solution

Learn the key considerations when choosing an MFA solution and why these top picks are worth a look.


international flags / global business discussion

White House international ransomware initiative outlines hopes and challenges

More than 30 nations discussed tactics for collaborating in the fight against ransomware, but it competes with a Russian-led UN initiative.


Microsoft Windows security  >  Windows laptop + logo with binary lock and key

Microsoft's very bad year for security: A timeline

Microsoft has had a horrible 2021, with vulnerabilities impacting its biggest services.


Advertisement

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.


CSO  >  secure mergers + acquisitions / floating puzzles pieces / abstract security mechanisms

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.


vulnerable breach cyberattack hacker

How shape-shifting threat actors complicate attack attribution

Researchers explain how they identified—or failed to identify—the threat actors behind three high-profile incidents and why attribution is so difficult.


ransomware

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.


A laptop displays binary code and the flag of China.

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

The attackers used the exploit to deploy a new remote shell Trojan called MysterySnail.