Sizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data. Hit w...
The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO) or chie...
https://www.csoonline.com/article/1291069/new-ciso-appointments-2024.html
AMPLIFIER LAUNCHES COPILOT TO GUIDE TEAMS THROUGH SECURITY PROTOCOLS APRIL 24: Amplifier Security is coming into the market and has announced a product that promises to connect the dots between ...
https://www.csoonline.com/article/1247366/top-cybersecurity-product-news-of-the-week.html
Because of its ubiquity as a network platform, Windows all too often gets blamed as the source of a host of network security vulnerabilities. But recent events have shown the truth — that all s...
As we near the halfway point of the year, organizations are under tremendous pressure to grow businesses across all industries. It’s no secret: bottom lines must rise and 2024 has been earmarke...
Salt Security has added a new OAuth security offering to its API protection platform to help organizations detect attempts to exploit OAuth and fix vulnerabilities associated with the protocol. ...
https://www.csoonline.com/article/2095199/salt-security-adds-defense-against-oauth-attacks.html
Cisco has urged its customers to upgrade their software after disclosing that state-sponsored hackers have compromised some of its security devices. In a blog post, the company said hackers exp...
2023 was a big year for threat intelligence. The sheer volume of threats and attacks revealed through Microsoft’s analysis of 78 trillion daily security signals indicates a shift in how threat ...
https://www.csoonline.com/article/2095115/what-will-cyber-threats-look-like-in-2024.html
ToddyCat, a Chinese advanced persistent threat (APT) group that has been targeting Asian and European government and military organizations over the past four years, is using several different t...
To help secure the operational technology (OT) systems within industrial organizations against growing targeted attacks, cybersecurity solutions provider Critical Start has launched a managed det...
BIOMETRICS DEFINITION Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices, or data. Examples of t...
More CISOs are dissatisfied with the role today than ever before, with studies showing that a high number of security chiefs (75%) are interested in a job change . What gives? Researchers, advi...
Breaches are inevitable due to the asymmetry of attacks – carpet checks versus guerilla warfare. Companies – regardless of size – have been breached. For years, security leaders have spoken...
https://www.csoonline.com/article/2094731/the-assumed-breach-conundrum.html
Absence of adequate remote access authentication has emerged as the probable cause of the infamous Change Healthcare ransomware attack. Attackers “compromised credentials on an application th...
Russia-linked advanced persistent threat (APT ) actor Forest Blizzard had, since June 2020, exploited a now-patched Windows vulnerability to drop previously unknown, custom post-compromise malwar...
While chief information security officers (CISOs) are rarely tasked with the full range of health and human safety concerns that facilities teams or chief security officers must act upon, CISOs s...
After the CSRB report , Microsoft must eschew marketing hyperbole while apologizing for its cavalier security practices, communicating its remediation plan, and report honest metrics to the secur...
An increasing number of attackers are trying to exploit a critical vulnerability in firewall appliances from Palo Alto Networks after proof-of-concept exploit code was published last week. The fl...
Modern software has completely transformed the way organizations operate and compete in the market. With the increasing demand for secure and reliable software delivered at scale, the pressure to...
It’s been said before—long before. It’s the 18th-century philosopher Voltaire who gets credit for the timeless proverb “Perfect is the enemy of good.” But here we are, centuries later...