CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 15, 2022

How cybercriminals use public online and offline data to target employees

A LinkedIn post about getting a new job turned into a potential phishing scam. Similar incidents are more common than you might think. Read more ▶

Image: Sponsored by Tableau: Data Fabric’s Value to the Enterprise

Sponsored by Tableau: Data Fabric’s Value to the Enterprise

Data fabrics are gaining momentum as the data management design for today’s challenging data ecosystems. Here’s why IT leaders are quickly adopting data fabrics for their organizations.

Cryptojacking, DDoS attacks increase in container-based cloud systems

Victims lose $53 for every $1 cryptojackers gain, according to a new report from Sysdig.

BrandPost Sponsored by Juniper Networks

You can’t have zero trust without visibility

Requirements for visibility necessitate a fundamental change in how network security is implemented, configured, managed, and maintained.

Image: Security startups to watch for 2022

Security startups to watch for 2022

Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.

11 old software bugs that took way too long to squash

As these examples show, vulnerabilities can lurk within production code for years or decades—and attacks can come at any time.

8 strange ways employees can (accidently) expose data

From eyeglass reflections and new job postings to certificate transparency logs and discarded printers, employees have odd ways to unintentionally expose data..

Most hackers need 5 hours or less to break into enterprise environments

A new survey of 300 ethical hackers provides insight into not only the most common means of initial access but how a complete end-to-end attack happens.

Enterprises embrace devsecops practices against supply chain attacks

Healthy developer-team culture and adherence to devsecops best practices to protect against supply chain attacks are surprisingly commonplace in today’s security environment, according to a report from Google Cloud's DORA research program.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494