Latest articles for CSO magazine

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and…

Security automation is maturing, but many firms not ready for adoption

The security automation industry is still in its infancy, with most vendors just a year or two old, but there are already some promising technologies…

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving cybersecurity in some industry segments, and has the potential to do more — if…

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out for public comment from the Open Web Application Security Project, and while most of…

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016.Cyberspionage accounted for 21 percent of cases…

Cybersecurity industry braces for tighter visa rules

The entire U.S. technology industry, including the cybersecurity sector, is heavily dependent on foreign talent. Not only are U.S. companies interested in hiring the smartest…

Most employees willing to share sensitive information, survey says

According to an end user security survey released this morning, 72 percent of employees are willing to share confidential information. In the financial services sector,…

Report: Cybercriminals prefer Skype, Jabber, and ICQ

The most popular instant messaging platforms with cyber criminals are Skype, Jabber and ICQ, according to a new report released this morning.Meanwhile, consumer-grade platforms like…

What it takes to become a data security strategist

By the time John Kronick became a data security strategist a few years ago, he’d already been in the security industry for 20 years. But…

InfoSec pros feel less external pressure, take security more personally

Security professionals are feeling less pressure from management, less pressure to approve IT projects early, and are less worried about emerging technologies, according to a…

Rollback of FCC privacy requirements could have broad repercussions

Last week’s roll-back of FCC privacy regulations was good news for ISPs and marketers and bad news for privacy advocates. But the decision could also…

What it takes to become a security systems administrator

download What it takes to become a security systems administrator CSO To read this article in full or to leave a comment, please click here(Insider…

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

Don’t pay ransoms. But if you must, here’s where to buy the Bitcoins

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy.Avoiding becoming part…

After Amazon outage, HealthExpense worries about cloud lock-in

Financial services companies as popular targets of cybercriminals for the obvious reason — they’re where the money’s at. And health care companies have medical records,…

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.”In…

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get…

Danes targeted by malware spread through Dropbox

Earlier this week, Danish-speaking users were hit by malware spread through Dropbox, but the company responded quickly to shut down the attack. According to a…

AI isn’t just for the good guys anymore

Last summer at the Black Hat cybersecurity conference, the  DARPA Cyber Grand Challenge  pitted automated systems against one another, trying to find weaknesses in the…

Experts split on how soon quantum computing is coming, but say we should start preparing now

Whether quantum computing promises to make current encryption methods obsolete.

Hackers get around AI with flooding, poisoning and social engineering

Machine learning technologies can help companies spot suspicious user behaviors, malicious software, and fraudulent purchases — but even as the defensive technologies are getting better,…

EMV migration delay doesn’t let gas stations completely off the hook

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t…

Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower

Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by…

Security pros most worried about clouds, mobile

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning.Around 60…

AI is coming, and will take some jobs, but no need to worry

The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…

Scholars, infosec experts call for action on Russian hacking

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually…

SIEMs-as-a-service addresses needs of small, midsize enterprises

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…

Report: Most cybercriminals earn $1,000 to $3,000 a month

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…

Ransomware victims able to thwart attacks, report says

The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files,…