CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 24, 2022

How legacy tech impedes zero trust and what to do about it

Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through. Read more ▶

Image: Sponsored by Salesforce: Taking an Agile, Customer-Centered Approach to Data Dashboards

Sponsored by Salesforce: Taking an Agile, Customer-Centered Approach to Data Dashboards

Everyone wants to be a data-driven company today, and for good reason. We know that data — good, relevant data — is critical for making informed business decisions.

Why CISO roles require business and technology savvy

Listening and communicating to both the technical and business sides is critical to successfully leading IT teams and business leaders to the same end-goal.

New US CISO appointments, September 2022

Keep up with news of CSO, CISO, and other senior security executive appointments.

Image: Get Expert Insights to Master Cloud Complexity

Get Expert Insights to Master Cloud Complexity

The world's leading CIOs and CISOs are grappling with a new era of enterprise system management. Register for CIO's virtual Future of Cloud Summit to learn how top executives are scaling hybrid clouds and cloud-native development for unprecedented use and flexibility.

Altruism under attack: why cybersecurity has become essential to humanitarian nonprofits

Nonprofits engaged in vital humanitarian work are finding themselves faced with increasing cybersecurity risks in an already challenging environment.

With Conti gone, LockBit takes lead of the ransomware threat landscape

Two new reports show LockBit is now the dominate ransomware choice thanks to a void left by Conti and updated code.

96% of companies report insufficient security for sensitive cloud data

Organizations are also having trouble tracking data in the cloud, which contributes to dark data.

Attackers switch to self-extracting password-protected archives to distribute email malware

This variation on an old technique does not require the victim to provide a password to execute the malware.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494