Laden...
CSO Security Leadership
The day's top cybersecurity news and in-depth coverage
May 15, 2024
Low-tech tactics still top the IT security risk chart
USB-based attacks, QR codes for phishing and social engineering continue to be some of the most effective, now more dangerous with the help of AI. Read more
Sponsored by 1Password: How do you secure unmanaged devices and apps?
Introducing 1Passwordâ Extended Access Management, a new solution that extends beyond traditional IAM to secure every sign-in to every app from every device, even the unmanaged applications and devices that are commonplace in the modern work environment. Read more
Backlogs at National Vulnerability Database prompt action from NIST and CISA
A crisis at the key US service for ranking vulnerabilities has been fueled by short resources and an explosion of security flaws as the volume of software production increases. Read more
CISA inks 68 tech vendors to secure-by-design pledge â but will it matter?
CISAâs pledge drew some big names, but the impact on software security could be limited. Meanwhile the org has extended its comment period on the CIRCIA cyberattack reporting law. Read more
Get more from the voice of CSOs and IT leadership
Read more from CSO delivered to your inbox. Subscribe now.
Dell data breach exposes data of 49 million customers
The company says the breach compromised non-critical customer data and involved no sensitive personal or financial information. Read more
Social engineering: Definition, examples, and techniques
Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs. Read more
Equipped with AI tools, hackers make apps riskier than ever
The odds of attacks are growing as attackers can now easily access code modification and reverse engineering tools. Read more
© 2024