Laden...
The day's top cybersecurity news and in-depth coverage
July 11, 2022
Attackers are targeting APIs with great success. Here's how to begin assessing your API attack surface and minimize your risk. Read more â¶
IT and security admins need a more permanent solution to protecting endpoints outside of the corporate walls.
China uses personal, business and political relationships to gather information and influence actions. U.S. and UK government agencies urge caution.
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.
Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSOâs Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:
When insiders exhibit risky behaviors, good-natured bots reach out to provide support in this CSO50 award-winning project.
APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.
Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity going forward.
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.
© 2024