What is the cyber kill chain? A model for tracing cyberattacks
The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.
What is the cyber kill chain? A model for tracing cyberattacks Read More »
The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.
What is the cyber kill chain? A model for tracing cyberattacks Read More »
Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.
How attackers sidestep the cyber kill chain Read More »
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to your DevOps processes.
Why DevOps pipelines are under attack and how to fight back Read More »
Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.
Data residency laws pushing companies toward residency as a service Read More »
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Ransomware recovery: 8 steps to successfully restore from backup Read More »
CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.
Botnet attacks on APIs: Why most companies are unprepared Read More »
CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API attacks.
How API attacks work, and how to identify and prevent them Read More »
CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.
Tips and tactics of today’s cybersecurity threat hunters Read More »
CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do it and how to kick them out for good.
5 ways attackers counter incident response, and how to stop them Read More »
CSO ONLINE–An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
How strong, flexible data protection controls can help maintain regulatory compliance Read More »
CSO ONLINE–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Supply chain attacks show why you should be wary of third-party providers Read More »
CSO ONLINE–The California Privacy Rights Act more closely aligns with the EU’s General Data Protection Regulation. Mid-sized companies not yet GDPR compliant face the biggest impact.
CPRA explained: New California privacy law ramps up restrictions on data use Read More »
CSO–Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how several companies have minimized their risk.
How secure are your AI and machine learning projects? Read More »
CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
How to protect backups from ransomware Read More »
CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
Supply chain attacks show why you should be wary of third-party providers Read More »