How attackers sidestep the cyber kill chain
Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.
Why DevOps pipelines are under attack and how to fight back
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to…
Data residency laws pushing companies toward residency as a service
Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.
Ransomware recovery: 8 steps to successfully restore from backup
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Botnet attacks on APIs: Why most companies are unprepared
CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.
How API attacks work, and how to identify and prevent them
CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API…
Tips and tactics of today’s cybersecurity threat hunters
CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond…
5 ways attackers counter incident response, and how to stop them
CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do…
How strong, flexible data protection controls can help maintain regulatory compliance
CSO ONLINE–An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.
Supply chain attacks show why you should be wary of third-party providers
CSO ONLINE–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
CPRA explained: New California privacy law ramps up restrictions on data use
CSO ONLINE–The California Privacy Rights Act more closely aligns with the EU’s General Data Protection Regulation. Mid-sized companies not yet GDPR compliant face the biggest…
How secure are your AI and machine learning projects?
CSO–Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how several companies have minimized their risk.
How to protect backups from ransomware
CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.
Supply chain attacks show why you should be wary of third-party providers
CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.
IBM, Intel, AMD take different routes to hardware-based encryption
CSO–So-called confidential computing approaches allow data to remain encrypted while in use. That’s best done in hardware, and IBM, AMD and Intel are following different…
Getting started with security automation
CSO–Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here’s how three…
California Consumer Privacy Act (CCPA): What you need to know to be compliant
CSO–California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.
8 ways to get more life out of an old SIEM
CSO–Can’t update your old security information and event management system now? Use this advice to maintain its effectiveness.
AI-powered deception technology speeds deployment, improves results
CSO–Aflac says artificial intelligence made its honeypot rollout faster, less complicated, and it produces high-quality alerts. A healthcare facility deploys deception technology for protection during…
8 PCI DSS questions every CISO should be able to answer
CSO–Any organization that processes credit card payments risks large fines and loss of their merchant accounts if they are not PCI DSS compliant when a…
9 CCPA questions every CISO should be prepared to answer
Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to…
What you need to know about the new OWASP API Security Top 10 list
APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.
Directory traversal explained: Definition, examples and prevention
Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making…
7 ways 5G mobile networks will change IoT security, and how to prepare
Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own.
Business email compromise attacks cost millions, losses doubling each year
Cybercriminals follow the money, and you need look no further than Toyota Boshoku’s recent $37 million loss to see why many are turning to BEC…
Rich PII enables sophisticated impersonation attacks
Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account…
How secure are your AI and machine learning projects?
When enterprises adopt new technology, security is often on the back burner. It can seem more important to get new products or services to customers…
6 ways cybercriminals use commercial infrastructure
Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities.
6 API security lessons from the Venmo breach
Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to…
How to close SIEM visibility gaps created by legacy apps
It’s often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options…