January 5, 2024
Via: CSO OnlineNew cybersecurity rules for US Department of Defense (DOD) contractors are entering the home stretch. The rules, which establish a comprehensive and scalable assessment mechanism within the agency’s Cybersecurity Maturity Model Certification (CMMC) program, aim to ensure that contractors and […]
November 30, 2023
Via: CSO OnlineIt’s common knowledge that natural disasters are increasingly threatening more and more of the world and in places that were once thought of as safe from the ravages of nature. According to the US National Oceanic and Atmospheric Administration, there […]
November 22, 2023
Via: CSO OnlineNearly 90% organizations have begun embracing zero-trust security, but many still have a long way to go, according to a report by multinational technology company Cisco. The report, based on a survey of 4,700 global information security professionals, found that […]
September 28, 2023
Via: CSO OnlineResearchers have come across a new Trojan program dubbed ZenRAT that is being distributed as an installer for the popular Bitwarden password management application, as well as employing other tricks to deceive users. The Trojan has information-stealing capabilities and hasn’t […]
September 20, 2023
Via: CSO OnlineThe potential monetary losses from security incidents caused by insider activity — purposeful or accidental — is sharply on the rise, as businesses continue to misunderstand the threat they pose. According to a report released today by AI-based risk management […]
July 21, 2023
Via: CSO OnlineThe upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer (CSO) or chief information security officer (CISO) for the […]
June 15, 2023
Via: CSO OnlineThe vast majority of CISOs have observed positive security culture gains in their organizations in the last year despite a perceived dip in the quality of overall security posture, according to the 10th annual Information Security Maturity Report published by […]
Security, Software, Technology
June 8, 2023
Via: CSO OnlineAre you still relying on legacy backup tools to protect your data from modern cyberthreats? Legacy backups were created with natural disasters in mind, not cyber threats such as ransomware. Attackers often target backups because if you can’t safely restore […]
May 10, 2023
Via: CSO OnlineThe use of digital twins — virtual representations of actual or envisioned real-world objects — is growing. Their uses are multifold and can be incredibly helpful, providing real-time models of physical assets or even people or biological systems that can […]
April 27, 2023
Via: CSO OnlineWith the recent publication of Gartner’s updated Magic Quadrant for Security Service Edge, we have been asked by several CXOs about this fast-growing solution category and how it relates to zero trust. The short answer is that they are closely […]
April 17, 2023
Via: CSO OnlineIt’s no secret that cybersecurity jobs are burning people out. It’s a high-pressure environment that ever seems to be ratcheting up the daily demand on security professionals. There are many reasons for this, but underlying them all is the way […]
March 14, 2023
Via: CSOEvery CISO has encryption implementation decisions to make at a variety of levels and instances as they sort the support needed for business operations such as production, sales, support, data retention, and communication. These decisions tend to lean heavily on […]
January 19, 2023
Via: CSOHigh-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals […]
January 19, 2023
Via: CSOCritical infrastructure forms the fabric of our society, providing power for our homes and businesses, fuel for our vehicles, and medical services that preserve human health. With the acceleration of digital transformation spurred by the pandemic, larger and larger volumes […]
November 21, 2022
Via: CSOGartner forecasts that information security spending will reach $187 billion in 2023, an increase of 11.1% from 2022. In tandem with this spending, the analyst firm also predicts that by 2025, a single centralized cybersecurity function will not be agile […]
October 25, 2022
Via: CSOCISOs have long been tasked with building response and recovery capabilities, the objective being to have teams that can react to a security incident as quickly as possible and can restore business functions with as little damage as possible. The […]
June 13, 2022
Via: CSOThe rising trend of zero trust implementation is a direct reaction to increasingly sophisticated cyberattacks. Zero-trust principles foster more effective threat detection because they reject the notion that security happens at the perimeter and that all network traffic is legitimate […]
April 14, 2022
Via: CSOAs an infosec professional, you’ve likely heard about using a cyber kill chain to help identify and prevent intrusions. Attackers are evolving their methods, which might require that you look at the cyber kill chain differently. What follows is an […]
January 14, 2022
Via: CSOThe number of cybersecurity mergers and acquisitions deals in 2021 set a record pace. The first three quarters of the year saw 151 transactions in the industry, according to 451 Research. That’s up from 94 for the same period in […]
February 10, 2021
Via: CSOManaging threat intelligence is like walking on a tightrope. To stay steady, you have to maintain balance between too little intelligence and too much; you run the risk of toppling off that tightrope and injuring the business, metaphorically speaking. If […]