Laden...
CSO Security Leadership
The day's top cybersecurity news and in-depth coverage
April 30, 2025
The CISO cloud security conundrum: Buy vs. build vs. both
The security of your cloud environments isnât just about the technology you choose or your model for implementing it. Itâs about making informed, business-aligned decisions that reduce real risk.
Read more
The state of intrusions: Stolen credentials and perimeter exploits on the rise, as phishing wanes
Cybercriminals also likely to leverage tools present within the targeted environment rather than to construct new malware or configure post-exploitation tools, according to Mandiantâs incident observations.
Reporting lines: Could separating from IT help CISOs?
CISOs who report to the CFO find that the shift away from IT can improve their ability to translate risk into business terms, communicate more effectively with executives, and avoid conflicts of interest with IT.
Secure by Design is likely dead at CISA. Will the private sector make good on its pledge?
CISAâs high-profile proselytizing of its Secure by Design program will likely end, but some experts think the idea still has momentum in the private sector, while others have become disillusioned altogether.
Huntress expands ITDR capabilities to combat credential theft and BEC
The identity-based improvements target rogue applications, credential theft, and BEC attacks while fully managed SIEM adds to Huntressâ SOC workflows.
AI looms large on the RSA Conference agenda
Expect artificial intelligence to be the topic of the week at the RSA Conference, with a slew of product announcements, panel discussions, and conversational buzz.
Proof-of-concept bypass shows weakness in Linux security tools, claims Israeli vendor
Linux security still too reliant on eBPF-based agents, says Armo.
© 2025