CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 11, 2022

Understanding your API attack surface: How to get started

Attackers are targeting APIs with great success. Here's how to begin assessing your API attack surface and minimize your risk. Read more ▶

Image: Sponsored by HCL: Effectively Manage All Endpoints, No Matter Where They Are Located

Sponsored by HCL: Effectively Manage All Endpoints, No Matter Where They Are Located

IT and security admins need a more permanent solution to protecting endpoints outside of the corporate walls.

U.S. and UK warn local governments, businesses of China's influence operations

China uses personal, business and political relationships to gather information and influence actions. U.S. and UK government agencies urge caution.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

Image: Reduce Your Risk With a Unilateral Security Approach

Reduce Your Risk With a Unilateral Security Approach

Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSO’s Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:

How Code42 automates insider risk response

When insiders exhibit risky behaviors, good-natured bots reach out to provide support in this CSO50 award-winning project.

Attacker groups adopt new penetration testing tool Brute Ratel

APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity going forward.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494