Quantcast
Browsing all 1606 articles
Browse latest View live

Microsoft delays Recall launch amid privacy concerns

Microsoft has decided to delay the full launch of its controversial Recall feature following criticism over data privacy and security, with access given to a smaller group of Windows users first. The...

View Article


Is it time to split the CISO role?

Cybersecurity has gained a lot of space and attention in recent years and with that attention came legislations, regulations and a lot more scrutiny. One of the results of this is that CISOs have now...

View Article


Hackers are selling stolen AMD data on the dark web in exchange for crypto

Chipmaker AMD is investigating a data breach after the notorious BreachForum hacker IntelBroker claimed possession of stolen internal data from the leading gaming and computing chipmaker. The...

View Article

Pegasus can target government and military officials

The controversial spyware Pegasus and its operator, the Israeli NSO Group, is once again in the news. Last week, in documents filed in a judgment between NSO and WhatsApp, they admitted that any of...

View Article

Chat apps’ end-to-end encryption threatened by EU legislation

A European Union legislative body is closing in on a final proposal for chat surveillance controls, despite growing opposition from industry groups and privacy advocates. Last November the Civil...

View Article


How AWS secures its infrastructure with Sonaris

AWS is using its public cloud infrastructure as a globe-spanning threat detection tool to protect customers from trillions of malicious attempts to access its resources each year. The cloud giant...

View Article

12 hottest IT security certs for higher pay today

Security professionals understand that certifications matter. Apart from a technical exam, there is no quicker way to gauge a person’s ability than to examine their certifications. Despite this fact,...

View Article

Fortinet, Ivanti zero-day victims face evolved persistence by the espionage...

A China-linked cyber espionage group has been employing a mix of techniques to maintain access to systems compromised with popular zero-day exploits, according to Mandiant research. Tracked as UNC3886...

View Article


How to achieve multi-cloud security at the speed of DevOps

Businesses’ use of numerous cloud services coupled with rapid software development and delivery practices is creating an explosion in potential attack surfaces — including myriad APIs, applications...

View Article


Download our cloud security posture management (CSPM) buyer’s guide

From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what cloud security posture management (CSPM) can do for their organizations and how to choose the right...

View Article

Dutch appellate court rules against Oracle and Salesforce in a GDPR-related...

A Dutch appellate court has ruled that Oracle and Salesforce must continue defending a class-action lawsuit relating to the use of cookies to gather and track personal information for their Data...

View Article

Cyber attack hits thousands of US car dealers

CDK Global, the provider of a software platform for auto dealerships, has had to shut down most of its systems due to what it described as “a cyber incident.” This had serious consequences for car...

View Article

Why the clean source principle is key to a successful zero trust strategy

How do you ensure that your remote access is secure? Do you consider your servers protected as long as you have in place a virtual private network (VPN), virtual desktop infrastructure (VDI), Azure...

View Article


What is swatting? Criminal harassment falsely involving armed police

Swatting definition Swatting is a form of criminal harassment in which attackers try to trick police forces into sending a heavily armed strike force to a victim’s home or business. The term takes its...

View Article

US bans Kaspersky Labs over national security concerns

The Biden administration has reached a decision to block all new sales of Kaspersky Labs’ products and services on US soil over allegations of the Moscow-based cybersecurity company’s strong ties to...

View Article


5 biggest risks of using third-party service providers

As business processes become more complex, companies are turning to third parties to boost their ability to provide critical services from cloud storage to data management to security. It’s often more...

View Article

Beware PowerShell: Too-helpful users tricked into ‘fixing’ their machines...

It’s bad enough that crooks foist malware on us for their profit – now some are persuading users to do their work for them. Security researchers have identified a technique using social engineering to...

View Article


Optus breach occurred due to a coding error, alleges ACMA

The Australian Communications and Media Authority (ACMA) has alleged the Optus data breach of September 2022 happened due to a coding error which Optus did not detect between September 17 and 20 2022...

View Article

Tata Communications partners with Versa Networks on hosted SASE

Tata Communications has entered the fast-growing SASE market with a hosted offering for global enterprises. It said that Hosted Secure Access Service Edge (SASE), offered in partnership with unified...

View Article

Are you a CISO who doesn’t know jack? Here’s how to bridge your own skills gap

In 2023, six years into his job as a CISO, Rob Labbé realized he didn’t know jack. Did he understand the technical aspects of cybersecurity? Of course. He had a college degree in computer programming...

View Article
Browsing all 1606 articles
Browse latest View live