Microsoft delays Recall launch amid privacy concerns
Microsoft has decided to delay the full launch of its controversial Recall feature following criticism over data privacy and security, with access given to a smaller group of Windows users first. The...
View ArticleIs it time to split the CISO role?
Cybersecurity has gained a lot of space and attention in recent years and with that attention came legislations, regulations and a lot more scrutiny. One of the results of this is that CISOs have now...
View ArticleHackers are selling stolen AMD data on the dark web in exchange for crypto
Chipmaker AMD is investigating a data breach after the notorious BreachForum hacker IntelBroker claimed possession of stolen internal data from the leading gaming and computing chipmaker. The...
View ArticlePegasus can target government and military officials
The controversial spyware Pegasus and its operator, the Israeli NSO Group, is once again in the news. Last week, in documents filed in a judgment between NSO and WhatsApp, they admitted that any of...
View ArticleChat apps’ end-to-end encryption threatened by EU legislation
A European Union legislative body is closing in on a final proposal for chat surveillance controls, despite growing opposition from industry groups and privacy advocates. Last November the Civil...
View ArticleHow AWS secures its infrastructure with Sonaris
AWS is using its public cloud infrastructure as a globe-spanning threat detection tool to protect customers from trillions of malicious attempts to access its resources each year. The cloud giant...
View Article12 hottest IT security certs for higher pay today
Security professionals understand that certifications matter. Apart from a technical exam, there is no quicker way to gauge a person’s ability than to examine their certifications. Despite this fact,...
View ArticleFortinet, Ivanti zero-day victims face evolved persistence by the espionage...
A China-linked cyber espionage group has been employing a mix of techniques to maintain access to systems compromised with popular zero-day exploits, according to Mandiant research. Tracked as UNC3886...
View ArticleHow to achieve multi-cloud security at the speed of DevOps
Businesses’ use of numerous cloud services coupled with rapid software development and delivery practices is creating an explosion in potential attack surfaces — including myriad APIs, applications...
View ArticleDownload our cloud security posture management (CSPM) buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps security IT staff understand what cloud security posture management (CSPM) can do for their organizations and how to choose the right...
View ArticleDutch appellate court rules against Oracle and Salesforce in a GDPR-related...
A Dutch appellate court has ruled that Oracle and Salesforce must continue defending a class-action lawsuit relating to the use of cookies to gather and track personal information for their Data...
View ArticleCyber attack hits thousands of US car dealers
CDK Global, the provider of a software platform for auto dealerships, has had to shut down most of its systems due to what it described as “a cyber incident.” This had serious consequences for car...
View ArticleWhy the clean source principle is key to a successful zero trust strategy
How do you ensure that your remote access is secure? Do you consider your servers protected as long as you have in place a virtual private network (VPN), virtual desktop infrastructure (VDI), Azure...
View ArticleWhat is swatting? Criminal harassment falsely involving armed police
Swatting definition Swatting is a form of criminal harassment in which attackers try to trick police forces into sending a heavily armed strike force to a victim’s home or business. The term takes its...
View ArticleUS bans Kaspersky Labs over national security concerns
The Biden administration has reached a decision to block all new sales of Kaspersky Labs’ products and services on US soil over allegations of the Moscow-based cybersecurity company’s strong ties to...
View Article5 biggest risks of using third-party service providers
As business processes become more complex, companies are turning to third parties to boost their ability to provide critical services from cloud storage to data management to security. It’s often more...
View ArticleBeware PowerShell: Too-helpful users tricked into ‘fixing’ their machines...
It’s bad enough that crooks foist malware on us for their profit – now some are persuading users to do their work for them. Security researchers have identified a technique using social engineering to...
View ArticleOptus breach occurred due to a coding error, alleges ACMA
The Australian Communications and Media Authority (ACMA) has alleged the Optus data breach of September 2022 happened due to a coding error which Optus did not detect between September 17 and 20 2022...
View ArticleTata Communications partners with Versa Networks on hosted SASE
Tata Communications has entered the fast-growing SASE market with a hosted offering for global enterprises. It said that Hosted Secure Access Service Edge (SASE), offered in partnership with unified...
View ArticleAre you a CISO who doesn’t know jack? Here’s how to bridge your own skills gap
In 2023, six years into his job as a CISO, Rob Labbé realized he didn’t know jack. Did he understand the technical aspects of cybersecurity? Of course. He had a college degree in computer programming...
View Article