



<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/">
	<channel>
		<title>CSO Online</title>
		<link>https://www.csoonline.com</link>
		<description></description>
		<language>en-us</language>
		<pubDate>Sun, 06 Jun 2021 12:13:11 -0700</pubDate>
		<lastBuildDate>Sun, 06 Jun 2021 12:13:11 -0700</lastBuildDate>
		
			<image>
				<url>https://idge.staticworld.net/cso/cso510x510.png</url>
				<title>CSO Online</title>
				<link>www.csoonline.com</link>
				<width>510</width>
				<height>510</height>
			</image>
		
		
			<image>
				<url>https://idge.staticworld.net/cso/cso798x288.png</url>
				<title>CSO Online</title>
				<link>www.csoonline.com</link>
				<width>796</width>
				<height>288</height>
			</image>
		
		

	
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Driving Digital Innovations and High Performance On and Off the Race Track</title>

		<pubDate>Fri, 04 Jun 2021 12:05:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Digital innovation has driven engineering advances for many sectors, including our businesses, homes, transportation and energy systems, and entertainment. The motor speedway is no stranger to the advanced technologies arising both inside the vehicles and outside. The ABB FIA Formula E World Championship is one of the fastest-growing series in motorsport dedicated to efficiency and performance driven by leading technology. Similarly, Fortinet drives digital innovations through our <a href="https://www.fortinet.com/solutions/enterprise-midsize-business/security-fabric.html?utm_source=pr&amp;utm_campaign=security-fabric" rel="nofollow">Fortinet Security Fabric</a>. BMW Motorsport relies on Fortinet to secure parts of their motorsport environments and operations across a highly distributed infrastructure.</p><p class="jumpTag"><a href="/article/3620936/driving-digital-innovations-and-high-performance-on-and-off-the-race-track.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3620936/driving-digital-innovations-and-high-performance-on-and-off-the-race-track.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/06/racing-track-with-motion-blur-picture-id1129629621-2-100891265-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/06/racing-track-with-motion-blur-picture-id1129629621-2-100891265-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>The SolarWinds hack timeline: Who knew what, and when? </title>

		<pubDate>Fri, 04 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Pam Baker</author>
		<dc:creator>Pam Baker</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p><em><span class="TextRun SCXO171497924 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXO171497924 BCX0"><strong>Editor's note:</strong> This article, originally published on April 5, 2021, has been updated to reflect recent developments.</span></span><span class="EOP SCXO171497924 BCX0"> </span></em></p><p>Details of the 2020 <a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">SolarWinds attack</a> continue to unfold, and it may be years before the final damages can be tallied.</p><p>While it is “hard to say” if the SolarWinds <a href="https://www.csoonline.com/article/3191947/supply-chain-attacks-show-why-you-should-be-wary-of-third-party-providers.html">software supply-chain compromise</a> will become known as the highest-impact cyber intrusion ever, it did catch “many people off guard” despite the security industry’s frequent warnings that supply chains pose substantial risks, according to Eric Parizo, principal analyst of security operations at Omdia, a global research firm.</p><p class="jumpTag"><a href="/article/3613571/the-solarwinds-hack-timeline-who-knew-what-and-when.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3613571/the-solarwinds-hack-timeline-who-knew-what-and-when.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2020/01/cio_dandelion_seeds_blown_by_virtual_wind_of_change_digital_transformation_flower_by_dawid_zawila_cc0_via_unsplash_abstract_digital_wave_stream_by_pete_linforth_aka_thedigitalartist_cc0_via_pixabay_1200x800-100826623-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Hacking</category>
					
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Security Recruiter Directory</title>

		<pubDate>Fri, 04 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>CSO staff</author>
		<dc:creator>CSO staff</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Looking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop.</p><p>The recruiters listed below can help you find your next chief information security officer (CISO) or VP of security and fill hard-to-hire positions in risk management, security operations, security engineering, compliance, application security, penetration testers, and computer forensics, among many others.</p><p>If you're a security recruiting firm, we want your information! Our goal is to provide the most complete recruiter resource available, but to do that we need your assistance. Please send the name, contact info and a few sentences about your company and its specialties to <a href="mailto:michael_nadeau@idg.com" rel="nofollow noopener" target="_blank">Michael Nadeau</a>.</p><p class="jumpTag"><a href="/article/3013033/security-recruiter-directory.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3013033/security-recruiter-directory.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/interview_discussion_review_hiring_recruitment_communication_collaboration_advice_by_andrey_popov_shutterstock_1845418462_2400x1600-100887558-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/interview_discussion_review_hiring_recruitment_communication_collaboration_advice_by_andrey_popov_shutterstock_1845418462_2400x1600-100887558-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Careers</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>IT Leadership</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Hacking 2FA: 5 basic attack methods explained</title>

		<pubDate>Thu, 03 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>David Strom</author>
		<dc:creator>David Strom</dc:creator>
		

		
		
		<description><![CDATA[<p>Multi-factor authentication (MFA) continues to embody both the best and worst of business IT security practice. As Roger Grimes <a href="https://www.csoonline.com/article/3272425/11-ways-to-hack-2fa.html">wrote in this article about two-factor hacks</a> three years ago, when MFA is done well it can be effective, but when IT managers take shortcuts it can be a disaster. And while more businesses are using more MFA methods to protect user logins, it still is far from universal. Indeed, according to a survey conducted by Microsoft last year, <a href="https://published-prd.lanyonevents.com/published/rsaus20/sessionsFiles/18468/IDY2-F03VP-2020_USA20_IDY2-F03_01_Breaking-Password-Dependencies-Challenges-in-the-Final-Mile-at-Microsoft.pdf" rel="nofollow">99.9% of compromised accounts did not use MFA</a> at all and only 11% of enterprise accounts are protected by some MFA method.<p class="jumpTag"><a href="/article/3620223/hacking-2fa-5-basic-attack-methods-explained.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3620223/hacking-2fa-5-basic-attack-methods-explained.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/09/cso_nw_multifactor_authentication_two-factor_2fa_mobile_phone_verification_of_permission_request_for_laptop_login_by_aurilaki_gettyimages-979049062_network_connections_by_your_photo_gettyimages-1001279264_2400x1600-100811587-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/09/cso_nw_multifactor_authentication_two-factor_2fa_mobile_phone_verification_of_permission_request_for_laptop_login_by_aurilaki_gettyimages-979049062_network_connections_by_your_photo_gettyimages-1001279264_2400x1600-100811587-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Multifactor Authentication</category>
					
				
				
					
						<category>Authentication</category>
					
				
				
					
						<category>Security</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Top cybersecurity M&amp;A deals for 2021</title>

		<pubDate>Thu, 03 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>CSO staff</author>
		<dc:creator>CSO staff</dc:creator>
		

		
		
		<description><![CDATA[<p>2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry. March alone saw more than 40 firms being acquired. The level of activity is driven by growth in sectors such as <a href="https://www.csoonline.com/article/2120384/what-is-iam-identity-and-access-management-explained.html">identity management</a>, <a href="https://www.csoonline.com/article/3247848/what-is-zero-trust-a-model-for-more-effective-security.html">zero trust</a>, managed security services, <a href="https://www.csoonline.com/article/3245748/what-is-devsecops-developing-more-secure-applications.html">DevSecOps</a> and cloud security.<p class="jumpTag"><a href="/article/3614764/top-cybersecurity-manda-deals-for-2021.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3614764/top-cybersecurity-manda-deals-for-2021.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/05/cso_secure_mergers_and_acquisitions_abstract_security_mechanisms_by_krulua_gettyimages-866263940_puzzle_pieces_by_simon_carter_peter_crowther_gettyimages-846077994_3x2_2400x1600-100796551-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/05/cso_secure_mergers_and_acquisitions_abstract_security_mechanisms_by_krulua_gettyimages-866263940_puzzle_pieces_by_simon_carter_peter_crowther_gettyimages-846077994_3x2_2400x1600-100796551-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Mergers and Acquisitions</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Cloud Security</category>
					
				
				
					
						<category>Zero Trust</category>
					
				
				
					
						<category>Identity and Access Management</category>
					
				
				
					
						<category>Managed Service Providers</category>
					
				
				
					
						<category>Managed IT Services</category>
					
				
				
					
						<category>Endpoint Protection</category>
					
				
				
					
						<category>DLP Software</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Data and Information Security</category>
					
				
				
					
						<category>Security Information and Event Management Software</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>17 cyber insurance application questions you&#039;ll need to answer</title>

		<pubDate>Wed, 02 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Susan Bradley</author>
		<dc:creator>Susan Bradley</dc:creator>
		

		
		
		<description><![CDATA[<p>I recently had to renew the cyber insurance policy for the office and it was interesting to see the evolution of questions asked over the years. At first, most of the cyber insurance questions involved basic computer security and merely checked to see if we had firewalls and antivirus and not much else.  Now the questions suggest that insurance providers understand that network security includes much more than antivirus software. Answering the questions gave me an insight into the type of risks they were evaluating and the security processes that they expected us to perform.<p class="jumpTag"><a href="/article/3619877/17-cyber-insurance-application-questions-youll-need-to-answer.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619877/17-cyber-insurance-application-questions-youll-need-to-answer.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/05/cso_cyber_insurance_online_financial_data_transactions_by_jauhari1_gettyimages-518507500_3x2_2400x1600-100796452-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/05/cso_cyber_insurance_online_financial_data_transactions_by_jauhari1_gettyimages-518507500_3x2_2400x1600-100796452-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Risk Management</category>
					
				
				
					
						<category>Insurance Industry</category>
					
				
				
					
						<category>Ransomware</category>
					
				
				
					
						<category>Password Managers</category>
					
				
				
					
						<category>Authentication</category>
					
				
				
					
						<category>Email Security</category>
					
				
				
					
						<category>Phishing</category>
					
				
				
					
						<category>Endpoint Protection</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>What are phishing kits? Web components of phishing attacks explained</title>

		<pubDate>Wed, 02 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Steve Ragan</author>
		<dc:creator>Steve Ragan</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p><em>Editor's note: This article, originally published on August 7, 2018, has been updated to include new information on phishing kit features.</em></p><p>Phishing is a social attack, directly related to <a href="https://www.csoonline.com/article/2124681/social-engineering/what-is-social-engineering.html">social engineering</a>. Commonly centered around email, criminals use <a href="https://www.csoonline.com/article/2117843/phishing/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html">phishing</a> to obtain access or information. Phishing attacks can be basic or customized toward the victim and their organization.</p><p>A phishing attack with a directed focus is called spear phishing. If, for example, the criminal were targeting a group or person within a company, they'd use spear phishing to make the email look and feel legitimate. Usually this is done by using the victim's correct name and title, referencing legitimate projects, known co-workers, or spoofing an email from a senior executive.</p><p class="jumpTag"><a href="/article/3290417/csos-guide-to-phishing-and-phishing-kits.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3290417/csos-guide-to-phishing-and-phishing-kits.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2016/11/phishing-threat-100691616-large.3x2.jpg" />
						<media:content url="https://images.techhive.com/images/article/2016/11/phishing-threat-100691616-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Phishing</category>
					
				
				
					
						<category>Social Engineering</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Defining linchpins: An industry perspective on remediating Sunburst</title>

		<pubDate>Tue, 01 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Helen Patton and Wendy Nather, Contributing writers</author>
		<dc:creator>Helen Patton and Wendy Nather, Contributing writers</dc:creator>
		

		
		
		<description><![CDATA[<p>The <a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">Sunburst campaign</a> underscored the inherent risk of technology to the public and private organizations who use it. It is important to examine what happened, look for opportunities to improve, and move forward. The Atlantic Council’s latest report “<a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/cyber-statecraft-initiative/breaking-trust/" rel="nofollow">Broken Trust: Lessons from Sunburst</a>” introduces the concept of “linchpins,” which it defines as “widely used software with significant permissions ... on which every other security program or critical resource depends,” and which were a key factor in the Sunburst event. The report identifies challenges to identifying, securing, and triaging this linchpin software.  <p class="jumpTag"><a href="/article/3619904/defining-linchpins-an-industry-perspective-on-remediating-sunburst.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619904/defining-linchpins-an-industry-perspective-on-remediating-sunburst.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/07/light_string_in_a_jar_at_sunset_lightbulbs_ideas_innovation_brainstorming_by_yeshi_kangrang_cc0_via_unsplash_1200x800-100765077-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/07/light_string_in_a_jar_at_sunset_lightbulbs_ideas_innovation_brainstorming_by_yeshi_kangrang_cc0_via_unsplash_1200x800-100765077-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Regulation</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Vulnerabilities</category>
					
				
				
					
						<category>Risk Management</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How cybercriminals turn ‘harmless’ stolen or leaked data into dollars</title>

		<pubDate>Tue, 01 Jun 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>John P. Mello Jr.</author>
		<dc:creator>John P. Mello Jr.</dc:creator>
		

		
		
		<description><![CDATA[<p>Now nearly halfway into 2021, <a href="https://www.identityforce.com/blog/2021-data-breaches" rel="nofollow noopener" target="_blank">more than two-dozen high-profile data breaches</a> have already occurred, some involving brands such as Facebook, LinkedIn, Instagram, US Cellular, T-Mobile, Geico and Experian. Data stolen during those intrusions will affect millions of users, even though some of that data may be as innocent as an email address. That's because stolen data doesn't live in a silo.<p class="jumpTag"><a href="/article/3619510/how-cybercriminals-turn-harmless-stolen-or-leaked-data-into-dollars.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619510/how-cybercriminals-turn-harmless-stolen-or-leaked-data-into-dollars.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/09/cso_nw_social_engineering_security_privacy_breach_fraud_hands_keyboard_network_avatars_financial_data_by_chainarong_prasertthai_gettyimages-1057890202_2400x1600-100811826-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/09/cso_nw_social_engineering_security_privacy_breach_fraud_hands_keyboard_network_avatars_financial_data_by_chainarong_prasertthai_gettyimages-1057890202_2400x1600-100811826-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Data Breach</category>
					
				
				
					
						<category>Data and Information Security</category>
					
				
				
					
						<category>Social Engineering</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Veterans are Key to Filling the Cybersecurity Skills Gap</title>

		<pubDate>Mon, 31 May 2021 10:42:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The cybersecurity skills gap is a global problem that must be addressed if we hope to stay ahead of today’s motivated cybercriminals. With this being said, there are strong synergies between military service and cybersecurity leading to veterans being a key component to helping address this growing challenge by filling critical cyber roles. In fact, almost 200,000 U.S. service workers transition into civilian life each year with on average 15-year experience under their belt.</p><p>Veterans possess situational and other traits that translate well to a role in cybersecurity. Recognizing this, as part of the Fortinet Training Advancement Agenda (<a href="https://www.fortinet.com/training/taa?utm_source=pr&amp;utm_campaign=taa" rel="nofollow">TAA</a>) and NSE Training Institute’s <a href="https://www.fortinet.com/corporate/careers/vets.html?utm_source=pr&amp;utm_campaign=fortivet" rel="nofollow">Veterans Program</a>, Fortinet facilitates the transition of exceptional military veterans and military spouses into the cybersecurity industry by providing professional networking, training, and mentoring to bring them up to speed as they transition to the civilian workplace. Today, hundreds of “FortiVets” have already been trained, with many more currently enrolled or successfully starting their careers in cybersecurity with Fortinet or other technology partners that are part of our hiring ecosystem.</p><p class="jumpTag"><a href="/article/3620220/veterans-are-key-to-filling-the-cybersecurity-skills-gap.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3620220/veterans-are-key-to-filling-the-cybersecurity-skills-gap.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/06/istock-1181401857-100890954-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/06/istock-1181401857-100890954-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>HITRUST explained: One framework to rule them all</title>

		<pubDate>Mon, 31 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Josh Fruhlinger</author>
		<dc:creator>Josh Fruhlinger</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<h2>HITRUST definition</h2>
<p>HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including <a href="https://www.csoonline.com/article/3602903/hipaa-explained-definition-compliance-and-violations.html">HIPAA</a>, <a href="https://www.csoonline.com/article/3202771/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html">GDPR</a>, <a href="https://www.csoonline.com/article/3566072/pci-dss-explained-requirements-fines-and-steps-to-compliance.html">PCI-DSS</a>, and more. The idea is that organizations that implement HITRUST—a sort of "one framework to rule them all"—will have done all or almost all of the work necessary to conform to a variety of cybersecurity regulations and standards.</p><p class="jumpTag"><a href="/article/3619534/hitrust-explained-one-framework-to-rule-them-all.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619534/hitrust-explained-one-framework-to-rule-them-all.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2020/07/virtual_checkmark_in_digital_system_standards_quality_control_certification_certificates_by_vertigo3d_gettyimages-530502390_cso_nw_2400x1600-100853299-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2020/07/virtual_checkmark_in_digital_system_standards_quality_control_certification_certificates_by_vertigo3d_gettyimages-530502390_cso_nw_2400x1600-100853299-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Compliance</category>
					
				
				
					
						<category>Regulation</category>
					
				
				
					
						<category>HIPAA</category>
					
				
				
					
						<category>PCI</category>
					
				
				
					
						<category>GDPR</category>
					
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>6 most common types of software supply chain attacks explained</title>

		<pubDate>Mon, 31 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Ax Sharma</author>
		<dc:creator>Ax Sharma</dc:creator>
		

		
		
		<description><![CDATA[<p>Software supply chain incidents have been making headlines recently. Despite similarities among these security incidents, not all supply chain attacks are created equal.<p class="jumpTag"><a href="/article/3619065/6-most-common-types-of-software-supply-chain-attacks-explained.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619065/6-most-common-types-of-software-supply-chain-attacks-explained.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/02/malware_attack_security_thinkstock_811239600-100749982-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/02/malware_attack_security_thinkstock_811239600-100749982-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
					
						<category>Supply Chain</category>
					
				
				
					
						<category>Application Security</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>SolarWinds attacker Nobelium targets over 150 companies in new mass email campaign</title>

		<pubDate>Fri, 28 May 2021 11:02:00 -0700</pubDate>

		
		
		
		<author>Lucian Constantin</author>
		<dc:creator>Lucian Constantin</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The Russian hacking group behind the supply chain attack that poisoned software updates for the SolarWinds Orion platform has been perfecting its email-based attacks over the past few months to plant backdoors inside organizations. These efforts recently escalated with an attack launched from a hijacked email marketing account belonging to USAID and targeted around 3,000 people across over 150 organizations in 24 countries.</p><aside class="fakesidebar">[ Learn <a href="https://www.csoonline.com/article/3367797/12-tips-for-effectively-presenting-cybersecurity-to-the-board.html">12 tips for effectively presenting cybersecurity to the board</a> and <a href="https://www.csoonline.com/article/3203705/10-steps-for-a-successful-incident-response-plan.html">6 steps for building a robust incident response plan</a>. | <a href="http://www.csoonline.com/newsletters/signup.html">Sign up for CSO newsletters</a>. ]</aside>
<p>The hacking group, known in the security industry <a href="https://attack.mitre.org/groups/G0016/" rel="nofollow noopener" target="_blank">as APT29</a>, Cozy Bear, The Dukes and Nobelium, has been tied to the Russian Foreign Intelligence Service (SVR) by <a href="https://media.defense.gov/2021/Apr/15/2002621240/-1/-1/0/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF/CSA_SVR_TARGETS_US_ALLIES_UOO13234021.PDF" rel="nofollow noopener" target="_blank">the US</a> and <a href="https://www.ncsc.gov.uk/news/uk-and-us-call-out-russia-for-solarwinds-compromise" rel="nofollow noopener" target="_blank">UK governments</a>. It has a long history of targeting governmental or government-tied organizations, sometimes using zero-day exploits to gain initial access. In this latest email campaign observed by Microsoft, around a quarter of Nobelium's targets were organizations involved in international development, humanitarian, and human rights work.</p><p class="jumpTag"><a href="/article/3620394/solarwinds-attacker-nobelium-targets-over-150-companies-in-new-mass-email-campaign.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3620394/solarwinds-attacker-nobelium-targets-over-150-companies-in-new-mass-email-campaign.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/01/binary_cyberattack_cybersecurity_hacked_protected-100747429-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/01/binary_cyberattack_cybersecurity_hacked_protected-100747429-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>TSA’s pipeline cybersecurity directive is just a first step experts say</title>

		<pubDate>Fri, 28 May 2021 03:50:00 -0700</pubDate>

		
		
		
		<author>Cynthia Brumfield</author>
		<dc:creator>Cynthia Brumfield</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The Transportation Safety Administration (TSA), an arm of the US Department of Homeland Security (DHS), released a <a href="https://assets.documentcloud.org/documents/20791875/security-directive-on-enhancing-pipeline-cybersecurity.pdf" rel="nofollow noopener" target="_blank">Security Directive</a> on Enhancing Pipeline Cybersecurity. TSA released the document two days after the Biden administration <a href="https://www.washingtonpost.com/business/2021/05/25/colonial-hack-pipeline-dhs-cybersecurity/" rel="nofollow noopener" target="_blank">leaked the details of the regulations</a> and less than a month after the ransomware attack on Colonial Pipeline created a significant gas shortage in the Southeast US.</p><p class="jumpTag"><a href="/article/3620300/tsa-s-pipeline-cybersecurity-directive-is-just-a-first-step-experts-say.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3620300/tsa-s-pipeline-cybersecurity-directive-is-just-a-first-step-experts-say.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.techhive.com/images/article/2017/04/data-pipeline_primary-100717923-large.3x2.jpg" />
						<media:content url="https://images.techhive.com/images/article/2017/04/data-pipeline_primary-100717923-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Regulation</category>
					
				
				
					
						<category>Compliance</category>
					
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>CIO Think Tank Roadmap Report: Reinventing IT</title>

		<pubDate>Fri, 28 May 2021 03:00:00 -0700</pubDate>

		
		
		
		<author>Derek Slater</author>
		<dc:creator>Derek Slater</dc:creator>
		

		
		
		<description>As companies accelerate out of pandemic disruption, how can IT meet increasing demands — and reap unprecedented benefits? In a series of virtual roundtables, dozens of IT leaders offered key insights about the road ahead.</description>

		<link>https://www.cio.com/article/3620410/cio-think-tank-roadmap-report-reinventing-it.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/07/idea_lights_lightbulbs_hands_by_josh_boot_cc0_via_unsplash_1200x800-100763485-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/07/idea_lights_lightbulbs_hands_by_josh_boot_cc0_via_unsplash_1200x800-100763485-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Leadership</category>
					
				
				
					
						<category>IT Management</category>
					
				
				
					
						<category>Hiring</category>
					
				
				
					
						<category>IT Skills</category>
					
				
				
					
						<category>Data Architecture</category>
					
				
				
					
						<category>Data Governance</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>New US CISO appointments, May 2021</title>

		<pubDate>Fri, 28 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>CSO staff</author>
		<dc:creator>CSO staff</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (<a href="https://www.csoonline.com/article/2122505/what-is-a-cso-understanding-the-critical-chief-security-officer-role.html">CSO</a>) or chief information security officer (<a href="https://www.csoonline.com/article/3332026/what-is-a-ciso-responsibilities-and-requirements-for-this-vital-leadership-role.html">CISO</a>) for the first time to support a deeper commitment to information security.</p><p>Follow this column to keep up with new appointments to senior-level security roles and perhaps gain a little insight into hiring trends. If you have an announcement of your own that you would like us to include here, contact <a href="mailto:amy_bennett@idg.com" rel="nofollow">Amy Bennett,</a> executive editor.</p><p class="jumpTag"><a href="/article/3204008/new-ciso-appointments.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3204008/new-ciso-appointments.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/07/cso_executives_professionals_silhouettes_of_business_people_in_motion_by_rawpixel_gettyimages-488851961_4200x1600-100800758-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/07/cso_executives_professionals_silhouettes_of_business_people_in_motion_by_rawpixel_gettyimages-488851961_4200x1600-100800758-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Careers</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>CSO and CISO</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Credential stuffing explained: How to prevent, detect, and defend against it</title>

		<pubDate>Thu, 27 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Lucian Constantin</author>
		<dc:creator>Lucian Constantin</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<h2>What is credential stuffing?</h2>
<p>Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts. Billions of login credentials have landed in the hands of hackers over the past several years as a result of data breaches. These credentials fuel the underground economy and are used for everything from spam to <a href="https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html">phishing</a> and account takeovers. Credential stuffing attacks are one of the most common ways cybercriminals abuse stolen usernames and passwords.</p><aside class="fakesidebar">
<p>[ Check out <a href="https://www.csoonline.com/article/3526408/most-common-passwords.html">the password hall of shame (and 10 tips for better password security)</a>. | Get the latest from CSO by <a href="http://www.csoonline.com/newsletters/signup.html">signing up for our newsletters</a>. ]</p><p class="jumpTag"><a href="/article/3448558/credential-stuffing-explained-how-to-prevent-detect-and-defend-against-it.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3448558/credential-stuffing-explained-how-to-prevent-detect-and-defend-against-it.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/10/cso_many_keys_one_lock_by_petr_bonek_gettyimages-872739656_2400x1600-100815712-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/10/cso_many_keys_one_lock_by_petr_bonek_gettyimages-872739656_2400x1600-100815712-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Passwords</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Simplifying Security Across Hybrid Clouds, Multi-clouds and for the Cloud On-ramp with Secure SD-WAN</title>

		<pubDate>Wed, 26 May 2021 10:42:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Today’s enterprises know the advantages of leveraging multi- and hybrid cloud environments. In fact, more than 90% now have <a href="https://www.fortinet.com/solutions/enterprise-midsize-business/cloud-security.html?utm_source=pr&amp;utm_campaign=multi-cloud-security" rel="nofollow">multi-cloud</a> and <a href="https://www.fortinet.com/resources/cyberglossary/what-is-hybrid-cloud?utm_source=pr&amp;utm_campaign=what-is-hybrid-cloud" rel="nofollow">hybrid (public/private) cloud</a> environments included as a critical component of their network and business strategy. This model enables organizations to allow critical data and essential applications to reside anywhere, on-premises, on campuses, at branch offices, in the data center, or the cloud. And wherever these applications reside need to be transparent to the user.</p><p class="jumpTag"><a href="/article/3619562/simplifying-security-across-hybrid-clouds-multi-clouds-and-for-the-cloud-on-ramp-with-secure-sd-wan.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619562/simplifying-security-across-hybrid-clouds-multi-clouds-and-for-the-cloud-on-ramp-with-secure-sd-wan.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/cloud-computing-technology-picture-id1260460234-4-100890001-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/cloud-computing-technology-picture-id1260460234-4-100890001-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cloud Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>5 best practices for conducting ethical and effective phishing tests</title>

		<pubDate>Wed, 26 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Michael Hill</author>
		<dc:creator>Michael Hill</dc:creator>
		

		
		
		<description><![CDATA[<p>Phishing simulations—or phishing tests—have become a popular feature of cybersecurity training programs in organizations of all sizes. One can see the appeal: phishing tests allow security staff to craft and send emails to employees en masse that are designed to appear as authentic and enticing as the genuine malicious <a href="https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html">phishing</a> emails that bombard businesses on a regular basis. These typically include lures such as missed delivery notices, invoice payment requests, and celebrity gossip.<p class="jumpTag"><a href="/article/3619610/best-practices-for-conducting-ethical-and-effective-phishing-tests.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619610/best-practices-for-conducting-ethical-and-effective-phishing-tests.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/11/cso_detecting_phishing_attempts_magnifying_lens_by_andreus_gettyimages-1128503636__fish_hook_by_clker-free-vector-images_cc0_via_pixabay-100816823-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/11/cso_detecting_phishing_attempts_magnifying_lens_by_andreus_gettyimages-1128503636__fish_hook_by_clker-free-vector-images_cc0_via_pixabay-100816823-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Phishing</category>
					
				
				
					
						<category>Security</category>
					
				
				
					
						<category>Email Security</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How to prepare for the demise of Windows NT LAN Manager</title>

		<pubDate>Wed, 26 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Susan Bradley</author>
		<dc:creator>Susan Bradley</dc:creator>
		

		
		
		<description><![CDATA[<p>Older protocols are hard to kill. From consumer-based protocols like SMBv1 to network-based protocols like Windows NT LAN Manager (NTLM), we typically need time and planning to move off protocols that we rely on. Many of us are still <a href="https://syfuhs.net/killing-ntlm-is-hard" rel="nofollow noopener" target="_blank">using NTLM</a> to authenticate to our networks especially for remote access during the pandemic. This old but well-used protocol was the default for network authentication in the Windows NT 4.0 operating system. It is less secure than more modern protocols such as Kerberos.<p class="jumpTag"><a href="/article/3619275/how-to-prepare-for-the-demise-of-windows-nt-lan-manager.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619275/how-to-prepare-for-the-demise-of-windows-nt-lan-manager.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2019/05/secure_system_network_security_policy_management_by_d3damon_gettyimages-970241738_2400x1600-100797424-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2019/05/secure_system_network_security_policy_management_by_d3damon_gettyimages-970241738_2400x1600-100797424-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Windows Security</category>
					
				
				
					
						<category>Network Security</category>
					
				
				
					
						<category>Authentication</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Changing the Narrative Around Attack Victim Shaming</title>

		<pubDate>Tue, 25 May 2021 08:48:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Victim shaming is never OK. Unfortunately, in some organizations, employees who fall victim to a social engineering ploy that leads to a ransomware attack are blamed for their actions.</p><p>“Shaming and blaming somebody for being attacked doesn’t teach anybody and it's certainly not going to make that organization better apt to take care of themselves in the future,” said Mat Gangwer, Senior Director of <a href="https://www.sophos.com/en-us/products/managed-threat-response.aspx" rel="nofollow">Managed Threat Response</a> at Sophos.</p><p>Social engineering attacks, like phishing emails, are common conduits of ransomware, and have become more sophisticated. So sophisticated that it’s easy for even some of the most seasoned veterans to get fooled.</p><p class="jumpTag"><a href="/article/3620069/changing-the-narrative-around-attack-victim-shaming.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3620069/changing-the-narrative-around-attack-victim-shaming.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/istock-1210239425-100889929-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/istock-1210239425-100889929-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How the post-pandemic world will challenge CISOs</title>

		<pubDate>Tue, 25 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Cynthia Brumfield</author>
		<dc:creator>Cynthia Brumfield</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>CISOs will have to manage new security challenges in a post-pandemic world. Reconfigured workplaces and employee health considerations, as well as increased threats, have been foisted on organizations just as many security workers are feeling tired and stressed out, according to experts speaking at last week’s RSA Conference.</p><aside class="fakesidebar">[ Learn <a href="https://www.csoonline.com/article/3367797/12-tips-for-effectively-presenting-cybersecurity-to-the-board.html">12 tips for effectively presenting cybersecurity to the board</a> and <a href="https://www.csoonline.com/article/3203705/10-steps-for-a-successful-incident-response-plan.html">6 steps for building a robust incident response plan</a>. | <a href="http://www.csoonline.com/newsletters/signup.html">Sign up for CSO newsletters</a>. ]</aside>
<p>"When COVID first hit, we jumped in like 'we do insecurity all the time.' We went into firefight mode, and we're good at it, and we practice it," Helen Patton, advisory CISO of Cisco Secure and former CISO at Ohio State University, said. "We're hitting the cadence of this going on for so long. You can feel the stress; you can feel the overworked-ness."</p><p class="jumpTag"><a href="/article/3619520/how-the-post-pandemic-world-will-challenge-cisos.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619520/how-the-post-pandemic-world-will-challenge-cisos.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2020/08/covid-19_coronavirus_morphology_impacts_statistical_curve_of_bar_chart_health_economic_impacts_infection_outbreak_pandemic_by_matejmo_gettyimages-1219125996_2400x1600-100854872-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2020/08/covid-19_coronavirus_morphology_impacts_statistical_curve_of_bar_chart_health_economic_impacts_infection_outbreak_pandemic_by_matejmo_gettyimages-1219125996_2400x1600-100854872-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>CSO and CISO</category>
					
				
				
					
						<category>Remote Work</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>Tailor security training to developers to tackle software supply chain risks</title>

		<pubDate>Tue, 25 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Michael Hill</author>
		<dc:creator>Michael Hill</dc:creator>
		

		
		
		<description><![CDATA[<p>A lack of cohesion between software development teams and cybersecurity functions compounds the software supply chain risks faced by organizations, making it all the more urgent for cybersecurity leaders and their teams to better engage with and educate developers. Standard cybersecurity awareness training won’t be effective with developers, experts say. The training must be tailored to address the specific cyber risks surrounding the software development lifecycle.<p class="jumpTag"><a href="/article/3619072/tailor-security-training-to-developers-to-tackle-software-supply-chain-risks.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619072/tailor-security-training-to-developers-to-tackle-software-supply-chain-risks.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/08/teamwork_code_review_developers_programmers_group_conversation_gesturing_by_nesa_by_makers_cc0_via_unsplash_1200x800-100768009-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/08/teamwork_code_review_developers_programmers_group_conversation_gesturing_by_nesa_by_makers_cc0_via_unsplash_1200x800-100768009-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>IT Skills</category>
					
				
				
					
						<category>IT Training </category>
					
				
				
					
						<category>Application Security</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Endpoint Detection and Response is a Key Weapon in the Battle Against Ransomware</title>

		<pubDate>Mon, 24 May 2021 09:42:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>It’s well known by now that the consequences of a successful ransomware attack go well beyond the financial loss of paying ransom. Damage to brand and reputation, lost productivity, and compromised data—even if ransom is paid—are common results. Current news of the gasoline shortage on the U.S. East Coast after a <a href="https://www.fortinet.com/resources/cyberglossary/ransomware?utm_source=pr&amp;utm_campaign=ransomware" rel="nofollow">ransomware attack</a> reminds us that consequences can be far-reaching. And the <a href="https://www.zdnet.com/article/first-death-reported-following-a-ransomware-attack-on-a-german-hospital/" rel="nofollow">first death</a> known to be associated with a ransomware attack in 2020, proved they can be deadly.</p><p class="jumpTag"><a href="/article/3619556/endpoint-detection-and-response-is-a-key-weapon-in-the-battle-against-ransomware.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619556/endpoint-detection-and-response-is-a-key-weapon-in-the-battle-against-ransomware.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/motherboard-circuit-background-virus-detected-over-circuit-board-worm-picture-id1206098096-2-100889814-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/motherboard-circuit-background-virus-detected-over-circuit-board-worm-picture-id1206098096-2-100889814-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>SolarWinds, Exchange attacks revive calls for mandatory breach notification, better information sharing</title>

		<pubDate>Mon, 24 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Cynthia Brumfield</author>
		<dc:creator>Cynthia Brumfield</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>On the heels of three major cybersecurity incidents over the past six months—the <a href="https://www.csoonline.com/article/3601508/solarwinds-supply-chain-attack-explained-why-organizations-were-not-prepared.html">SolarWinds</a> and <a href="https://www.csoonline.com/article/3616699/the-microsoft-exchange-server-hack-a-timeline.html">Microsoft Exchange</a> supply chain attacks and the <a href="https://www.csoonline.com/article/3618016/colonial-pipeline-shutdown-highlights-need-for-better-ot-cybersecurity-practices.html">Colonial Pipeline</a> ransomware attack—government officials and some in the private sector are reviving calls for better information sharing and national breach notification requirements.</p><p class="jumpTag"><a href="/article/3619066/solarwinds-exchange-attacks-revive-calls-for-mandatory-breach-notification.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619066/solarwinds-exchange-attacks-revive-calls-for-mandatory-breach-notification.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/01/succession_brain-sharing_intellectual-knowledge_sharing-100746954-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/01/succession_brain-sharing_intellectual-knowledge_sharing-100746954-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
					
						<category>Cybercrime</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>The 10 most dangerous cyber threat actors</title>

		<pubDate>Mon, 24 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Andrada Fiscutean</author>
		<dc:creator>Andrada Fiscutean</dc:creator>
		

		
		
		<description><![CDATA[<p>When hacking began many decades ago, it was mostly the work of enthusiasts fueled by their passion for learning everything they could about computers and networks. Today, nation-state actors are developing increasingly sophisticated cyberespionage tools, while cybercriminals are cashing in millions of dollars targeting everything from Fortune 500 companies to hospitals.<p class="jumpTag"><a href="/article/3619011/the-10-most-dangerous-cyber-threat-actors.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2020/09/anonymous_hooded_figure_amid_abstract_network_of_connections_data_security_threats_crime_criminal_hacker_by_natasa_adzic_gettyimages-1198636820_2400x1600-100859330-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2020/09/anonymous_hooded_figure_amid_abstract_network_of_connections_data_security_threats_crime_criminal_hacker_by_natasa_adzic_gettyimages-1198636820_2400x1600-100859330-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Malware</category>
					
				
				
					
						<category>Cybercrime</category>
					
				
				
					
						<category>Cyberattacks</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: The Importance of Network Data in Cloud Workload Security</title>

		<pubDate>Fri, 21 May 2021 13:25:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>Cloud workloads are deployed into highly dynamic environments, often utilizing and coexisting with a wide variety of cloud providers and third-party platforms and services. The workloads themselves can range from legacy applications that have been migrated from traditional on-premises data centers, to applications that have been built specifically to run on cloud platforms, to entirely serverless applications. They may run unchanged for weeks or months, or only exist for a few seconds.</p><p><strong>Many Ways to 'Secure' Cloud Workloads</strong></p><p>There are also many ways to monitor and protect cloud workloads, including agent-based third-party solutions, cloud provider monitoring and logging services, cloud perimeter firewalls, and WAFs. Like anything in life, security technologies come with certain advantages and drawbacks, so organizations often deploy a variety of cloud workload security solutions depending on their regulatory environment, desired security posture, and aversion to risk.</p><p class="jumpTag"><a href="/article/3619554/the-importance-of-network-data-in-cloud-workload-security.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619554/the-importance-of-network-data-in-cloud-workload-security.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/blog6-100889706-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/blog6-100889706-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cloud Security</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: What the Colonial Pipeline Attack Means for Securing Critical Infrastructure</title>

		<pubDate>Fri, 21 May 2021 12:49:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>The cyber attack on Colonial Pipeline is the latest in an increasing number of ransomware attacks that have been targeting both private enterprise and the public sector.</p><p>In this case, it appears that the ransomware variant involved is DarkSide, which ExtraHop has seen in customer environments. This campaign starts by mapping the environment and exfiltrating data, meaning that the attackers likely now have access to detailed information about the company and its pipeline operations. Then the attackers start encrypting systems, making entire portions of the infrastructure unavailable.</p><p>This two-pronged approach has become increasingly common, used in major attacks such as the recent<a href="https://www.extrahop.com/company/blog/2021/ransomware-exfiltration-and-revil-attack/?uniqueid=SC07532192&amp;utm_source=idg-brandpost&amp;utm_medium=display&amp;utm_campaign=2021-q2-secpub-awareness&amp;utm_content=blog&amp;utm_term=no-term&amp;utm_region=global&amp;utm_product=all&amp;utm_funnelstage=no-stage&amp;utm_version=no-version" rel="noopener nofollow" target="_blank"> REvil attacks on Acer</a>. Exfiltrating potentially sensitive data gives added leverage to attackers and makes detecting and stopping <a href="https://www.extrahop.com/company/blog/2020/ransomware-explanation-and-prevention/?uniqueid=KV07532193&amp;utm_source=idg-brandpost&amp;utm_medium=display&amp;utm_campaign=2021-q2-secpub-awareness&amp;utm_content=blog&amp;utm_term=no-term&amp;utm_region=global&amp;utm_product=all&amp;utm_funnelstage=no-stage&amp;utm_version=no-version" rel="noopener nofollow" target="_blank">ransomware </a>even more important.</p><p class="jumpTag"><a href="/article/3619880/what-the-colonial-pipeline-attack-means-for-securing-critical-infrastructure.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619880/what-the-colonial-pipeline-attack-means-for-securing-critical-infrastructure.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/blog4-100889703-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/blog4-100889703-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
	<item>

		<title>How API attacks work, and how to identify and prevent them</title>

		<pubDate>Fri, 21 May 2021 02:00:00 -0700</pubDate>

		
		
		
		<author>Maria Korolov</author>
		<dc:creator>Maria Korolov</dc:creator>
		

		
		
		<description><![CDATA[<p>In early May, fitness company Peloton announced that it had exposed customer account data on the internet. Anyone could access users’ account data from Peloton’s servers, even if the users set their account profiles as private. The cause: a faulty API that permitted unauthenticated requests.<p class="jumpTag"><a href="/article/3618569/how-api-attacks-work-and-how-to-identify-and-prevent-them.html#jump">To read this article in full, please click here</a></p></section></article>]]>(Insider Story)</description>

		<link>https://www.csoonline.com/article/3618569/how-api-attacks-work-and-how-to-identify-and-prevent-them.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2018/01/vulnerable_breach_cyberattack_hacker-100747294-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2018/01/vulnerable_breach_cyberattack_hacker-100747294-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Application Security</category>
					
				
				
					
						<category>Internet Security</category>
					
				
				
					
						<category>Devsecops</category>
					
				
				<category>IDG Insider</category>
			</categories>
 		
		
	</item>
 
					
				
			
		
			
				
				
					
						
							
							
						















	
		
		
		
		
	
	
	
	



	
	
	
		
			
				
			
			
		
		
	<item>

		<title>BrandPost: Don’t Make Haste! The Downside of Rushing Attribution </title>

		<pubDate>Thu, 20 May 2021 08:52:00 -0700</pubDate>

		
		
		
		<author>Brand Post</author>
		<dc:creator>Brand Post</dc:creator>
		

		
		
		<description><![CDATA[<article>
	<section class="page">
<p>There are any number of bad actors behind cyber attacks these days. From enterprising criminals to nation-states to hacktivists to malicious insiders, there are multiple possibilities of who is behind it when a system is compromised and data is breached.</p><p>Compromised organizations sometimes rush to point fingers at who is responsible for attacks and threats because it is gratifying.</p><p>“Researchers and vendors sometimes rush to attribution,” said Mat Gangwer, Senior Director of <a href="https://www.sophos.com/en-us/products/managed-threat-response.aspx" rel="nofollow">Managed Threat Response</a> at Sophos. “It can often be because they want to be the first to make claims that it was a specific group or nation state. And some organizations may do it as a way to reveal the sophistication of the attack they are facing.”</p><p class="jumpTag"><a href="/article/3619790/don-t-make-haste-the-downside-of-rushing-attribution.html#jump">To read this article in full, please click here</a></p></section></article>]]></description>

		<link>https://www.csoonline.com/article/3619790/don-t-make-haste-the-downside-of-rushing-attribution.html#tk.rss_all</link>
		
		
		
		
		
			
				
				
					<media:thumbnail
						url="https://images.idgesg.net/images/article/2021/05/istock-1144604245-100889488-large.3x2.jpg" />
						<media:content url="https://images.idgesg.net/images/article/2021/05/istock-1144604245-100889488-large.3x2.jpg"/>
				
			
		
		
		

		
		
			<categories>
				
				
					
						<category>Cyberattacks</category>
					
				
				
			</categories>
 		
		
	</item>
 
					
				
			
		
	
	




	</channel>
</rss>