Quantcast
Browsing all 1623 articles
Browse latest View live

The growing dichotomy of AI-powered code in cloud-native security

AI-generated code promises to reshape cloud-native application development practices, offering unparalleled efficiency gains and fostering innovation at unprecedented levels. However, amidst the...

View Article


Live Nation SEC filing confirms “unauthorized activity” in wake of alleged...

Following a cybercrime group’s claims that it stole data from 560 million Ticketmaster customers, the ticket sales and distribution firm’s parent company told the US Securities and Exchange Commission...

View Article


US Senate finance chair slams Change Healthcare for ‘negligence’ in...

A US Senate committee chair is urging the administration of President Joe Biden to hold UnitedHealth Group (UHG) accountable for negligent cybersecurity practices in a ransomware attack against...

View Article

CISM certification: Requirements, training, exam, and cost

What is CISM? Certified Information Security Manager (CISM) is an advanced certification for IT and cybersecurity professionals that demonstrates they ability to develop and manage an infosec program...

View Article

Breach and attack simulation tools: Top vendors, key features, how to choose

Breach and attack simulation (BAS) products help organizations understand their security posture by automating the tests of specific threat vectors. BAS typically uses MITRE ATT&CK and Cyber...

View Article


Atlassian’s Confluence hit with critical remote code execution bugs

Atlassian Confluence Data Center and Server has been hit with a critical remote code execution bug, allowing authenticated threat actors to exploit account privileges and execute arbitrary codes. The...

View Article

Major service tag security problems reported in Microsoft Azure

Tenable Research has reported a vulnerability in Microsoft Azure service tags that “allows an attacker to bypass firewall rules … by forging requests from trusted services.” “The vulnerability was...

View Article

NIST is finally getting help with the National Vulnerability Database backlog

Maryland-based security firm Analygence has landed the job of helping the National Institute of Standards and Technology (NIST) reduce mounting backlog of entries in the US National Vulnerability...

View Article


Unauthorized AI is eating your company data, thanks to your employees

Employees at many organizations are engaging in widespread use of unauthorized AI models behind the backs of their CIOs and CISOs, according to a recent study. Employees are sharing company legal...

View Article


Arctic Wolf sniffs out new ransomware variant

Arctic Wolf’s incident response team has identified a new ransomware variant, referred to as Fog — targeting the education and recreation sectors in the US — presumably for easy infection and quicker...

View Article

Cloud security challenges are growing. Here’s why traditional SOC tools are...

The cloud will become a cornerstone of enterprise operations as IDC estimates that by 2025, there will be over 750 million cloud-native applications globally. Additionally, over 90% of organizations...

View Article

London hospitals face days of disruption after ransomware attack on supply...

Several large hospitals in Britain’s capital London face days and possibly weeks of disruption after a partner organization was compromised by a potent ransomware attack. The attack on June 3 targeted...

View Article

Navigating AI disruption in cybersecurity: Practical steps for leaders

Security leaders live under the constant pressure of evolving and scaling threats, technology trends, and business requirements. Many of us have had to play the rough catch-up game when we failed to...

View Article


Image may be NSFW.
Clik here to view.

Nominations for CSO30 Australia 2024 open

Nominations for the 2024 CSO30 Australia Awards have opened. The 2024 CSO30 Awards will be held together with the CIO50 Awards at the Shangri-La Hotel in Sydney on October 17th. The CSO30 Australia is...

View Article

Long-running Chinese cyberespionage operation targeted Southeast Asian...

Researchers have uncovered a long-running cyberespionage operation by a possibly state-run Chinese threat actor against an unidentified high-profile government organization from Southeast Asia. The...

View Article


What CISOs need to know about Microsoft’s Copilot+

Microsoft recently announced a technology that contains a feature that is leading some in security to scratch their heads and wonder: “What were they thinking?” Called Copilot+, it brings artificial...

View Article

Complaints in EU challenge Meta’s plans to utilize personal data for AI

Meta is facing renewed scrutiny over privacy concerns as the privacy advocacy group NOYB has lodged complaints in 11 countries against the company’s plans to use personal data for training its AI...

View Article


Download our password managers enterprise buyer’s guide

From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what password managers can do for their organizations and how to choose the right solution.

View Article

FBI offers to share 7,000 LockBit ransomware decryption keys with CISOs

The FBI has acquired more than 7,000 decryption keys from the massive ransomware group LockBit — and is encouraging corporate victims to come forward to see if the keys can unlock any of their data....

View Article

How Amazon CISO Amy Herzog responds to cybersecurity challenges

There is no such thing as a typical career path for many CISOs, and Amy Herzog’s journey is no exception. Herzog is one of several CISOs for Amazon, she is responsible for two large pieces of the...

View Article
Browsing all 1623 articles
Browse latest View live