Tag: CSO Online

APT actors exploit flaw in ManageEngine single sign-on solution

This article has been indexed from CSO Online Cyberespionage groups are exploiting a critical vulnerability patched earlier this month in ManageEngine ADSelfService Plus, a self-service password management and single sign-on (SSO) solution for Active Directory environments. The FBI, CISA and…

7 unexpected ransomware costs

This article has been indexed from CSO Online Ransomware is one of the fastest-growing cybersecurity attacks. One of the factors that makes these threats especially intimidating is that the costs can be far-reaching. An August 2021 report from security consultancy NCC…

5 observations about XDR

This article has been indexed from CSO Online It’s safe to say that my esteemed colleague Dave Gruber and I were following XDR before the term XDR existed.  Yup, we were heads down studying the SOC and a security platform…

Top cybersecurity M&A deals for 2021

This article has been indexed from CSO Online 2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry. March alone saw more than 40 firms being acquired. The level of activity is driven…

How CISOs and CIOs should share cybersecurity ownership

This article has been indexed from CSO Online In most organizations, it is common for both the CISO and CIO to have responsibilities around cybersecurity—an issue increasingly pivotal to the effective running of any modern business. Clear, defined cybersecurity ownership…

Steganography explained and how to protect against it

This article has been indexed from CSO Online Steganography definition Steganography is a millennia-old concept that means hiding a secret message within an ordinary-looking file that doesn’t raise any suspicions. The word has Greek roots, being a combination of steganos,…

How to find a security-savvy MSP

This article has been indexed from CSO Online The US Cybersecurity and Infrastructure Security Agency (CISA) released a document called Risk Considerations for Managed Service Provider Customers. CISA acknowledges the role of network administrators, among others, in selecting an MSP.…

8 top cloud security certifications

This article has been indexed from CSO Online As companies move more and more of their infrastructure to the cloud, they’re forced to shift their approach to security. The security controls you need to put in place for a cloud-based…

Russia is fully capable of shutting down cybercrime

This article has been indexed from CSO Online It is no secret the locus for a great deal of the world’s cybercriminal activity lays within the boundaries of The Russian Federation. The  onslaught of ransomware attacks directed at non-Russian entities…

8 pitfalls that undermine security program success

This article has been indexed from CSO Online Some of the biggest breaches have come down to small mistakes. Hackers used a compromised password to access the company network via a virtual private network in the May 2021 Colonial Pipeline…

18 cybersecurity startups to watch

This article has been indexed from CSO Online If you want to know what’s new in cybersecurity, watch what the startup vendors are doing. They typically begin with an innovative idea and are unfettered by an installed base and its…

The case for a SaaS bill of material

This article has been indexed from CSO Online President Biden’s cybersecurity Executive Order on Improving the Nation’s Cybersecurity has triggered massive buzz regarding software bills of material (SBOMs). While we advocate for improving software supply chain security through greater transparency regarding…

The 10 most powerful cybersecurity companies

This article has been indexed from CSO Online COVID-19 has changed the face of security forever. The perimeter defense model, which had been slowly crumbling, has now been shattered. Employees are working from home, many of them permanently. Applications are…

8 must-ask security analyst interview questions

This article has been indexed from CSO Online You’re interviewing candidates for a security analyst position. One is a history major with no formal technical experience. The other has an advanced degree in computer science, with a focus on cybersecurity,…

Critical flaw in Atlassian Confluence actively exploited

This article has been indexed from CSO Online Hackers have started exploiting a critical remote code execution vulnerability that was patched recently in Atlassian Confluence Server and Data Center. Some of the attacks deploy cryptocurrency mining malware, but Atlassian products…

The CSO guide to top security conferences, 2021

This article has been indexed from CSO Online There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of…

9 notable government cybersecurity initiatives of 2021

This article has been indexed from CSO Online Cybersecurity has steadily crept up the agenda of governments across the globe. This has led to initiatives designed to address cybersecurity issues that threaten individuals and organizations. “Government-led cybersecurity initiatives are critical…

CDPSE certification: Requirements, exam, and cost

This article has been indexed from CSO Online What is the CDPSE certification? The Certified Data Privacy Solutions Engineer (CDPSE) certification focuses on the implementation of privacy solutions, from both a technical and governance perspective. It is offered by ISACA, a…

Unpatched Exchange Servers an overlooked risk

This article has been indexed from CSO Online The US Cybersecurity and Infrastructure Security Agency (CISA) has started a list of what it deems to be bad security practices. The two on the list so far instruct any organization that…

How ransomware runs the underground economy

This article has been indexed from CSO Online The unwanted attention attracted by ransomware attacks recently have caused several of the top cybercrime forums to ban ransomware discussions and transactions on their platforms earlier this year. While some hoped this…

The 7 best password managers for business

This article has been indexed from CSO Online Enterprise-class password managers have become one of the easiest and most cost-effective ways to help employees lock down their online accounts. Most of the options were originally designed for individual users. Your…

The T-Mobile data breach: A timeline

This article has been indexed from CSO Online Telecommunications giant T-Mobile has warned that information including names, dates of birth, US Social Security numbers (SSNs), and driver’s license/ID of some 50 million individuals comprising current, former, or prospective customers has…

Security Recruiter Directory

This article has been indexed from CSO Online Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next chief information security officer (CISO) or…

New US CISO appointments, August 2021

This article has been indexed from CSO Online The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO)…

What CISOs need to know about Wi-Fi 6E

This article has been indexed from CSO Online Wi-Fi 6E is a technical extension of the Wi-Fi 6 standard to deliver improved Wi-Fi capacity, less interference, and higher throughput. Introduced in January 2021 by the Wi-Fi Alliance, Wi-Fi 6E allows…

The T-Mobile data breach: A timeline

This article has been indexed from CSO Online Telecommunications giant T-Mobile has warned that information including names, dates of birth, US Social Security numbers (SSNs), and driver’s license/ID of almost 50 million individuals comprising current, former, or prospective customers has…

How attackers could exploit breached T-Mobile user data

This article has been indexed from CSO Online T-Mobile has confirmed a data breach that impacted nearly 50 million people, including current, former and prospective subscribers. The exposed details differed across different types of customers, so the level of risk…

Top cybersecurity M&A deals for 2021

This article has been indexed from CSO Online 2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry. March alone saw more than 40 firms being acquired. The level of activity is driven…

BrandPost: The CIS Benchmarks Community Consensus Process

This article has been indexed from CSO Online The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS Benchmark was released in 2000. Today, there are more than 100 CIS…

7 steps to protect against ransomware-related lawsuits

This article has been indexed from CSO Online International ransomware gangs aren’t the only people after your enterprise’s money. Long after a ransomware attack fades into gloomy history, your organization could face another potentially devastating financial threat: lawyers filing action…

Security teams report rise in cyber risk

This article has been indexed from CSO Online Do you feel like you are gaining in your ability to protect your data and your network? If you are like 80% of respondents to the Trend Micro’s biannual Cyber Risk Index…

Data sovereignty laws place new burdens on CISOs

This article has been indexed from CSO Online Your information is at the crux of the issue of data sovereignty. Where is your information? Who has access to the information? Do you have control of your information in each country,…

Why you need a SaaS governance plan, and what should be in it

This article has been indexed from CSO Online SaaS adoption is far outpacing IaaS consumption. Despite that, organizations are focusing almost exclusively on infrastructure security. They must also consider a SaaS governance plan that implements security measures to reduce risk…

CISOs’ 15 top strategic priorities for 2021

This article has been indexed from CSO Online Security’s all-too-frequent appearance as a front-page headline making topic has put CISOs in the hot seat as CEOs and boards worry that it could be their names next in news stories trying…

6 risk factors to know when hiring an MSSP

This article has been indexed from CSO Online With enterprise adoption of managed security services gradually maturing, the rewards and risks of using these services have become a lot clearer for current and potential customers. A recent survey by Forrester…

Wave of native IIS malware hits Windows servers

This article has been indexed from CSO Online Security researchers warn that multiple groups are compromising Windows web servers and are deploying malware programs that are designed to function as extensions for Internet Information Services (IIS). Such malware was deployed…

5 best practices for designing application logs

This article has been indexed from CSO Online Veronica Schmitt started to wear an implantable cardiac device when she was 19. A few years ago, although the small defibrillator appeared to be working properly, she felt sick. “I kept passing…

7 tips for better CISO-CFO relationships

This article has been indexed from CSO Online Every chief security executive knows that one of the most important—and perhaps challenging—aspects of the job is getting the funding needed to support the cybersecurity program. The person handing the decision making…

Real IT leadership: Selling the transformative dream

This article has been indexed from CSO Online It’s one thing to cook up a great new initiative, but making it happen requires powers of persuasion, solid partnerships, and access to genuine technical insight. Read the original article: Real IT…

The most dangerous (and interesting) Microsoft 365 attacks

This article has been indexed from CSO Online Government-sponsored hackers, who carry out cyberespionage campaigns, invest more resources than ever to find new ways of attacking the cloud. One of their preferred targets is Microsoft 365, previously called Office 365,…

BrandPost: How to Implement Secure Configurations Faster Than Ever

This article has been indexed from CSO Online Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since applications, hardware, and technology systems typically ship with default settings, it’s important to review and implement recommended guidance.…

The CSO guide to top security conferences, 2021

This article has been indexed from CSO Online There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of…

17 cybersecurity startups to watch

This article has been indexed from CSO Online If you want to know what’s new in cybersecurity, watch what the startup vendors are doing. They typically begin with an innovative idea and are unfettered by an installed base and its…

4 things you should know about cybersecurity pros

This article has been indexed from CSO Online The 5th annual Life and Times of Cybersecurity Professionals report from ESG and the Information Systems Security Association (ISSA) provides valuable insight into the challenges cybersecurity pros  face, how they see themselves…

BrandPost: Why and How to Get Started with SASE

This article has been indexed from CSO Online Hybrid IT environments — multiple clouds, edge, on-premises infrastructure, a distributed workforce — are putting the old approach to network security to the extreme test. The traditional centralized approach via MPLS and…

BrandPost: Top 3 Metrics for Evaluating Passwordless

This article has been indexed from CSO Online There is considerable interest in going passwordless and adopting biometric authentication for application access. According to a recent survey by Cisco: 52% of IT decision makers are actively considering passwordless solutions 79%…