INCIBE demonstrates value of ransomware simulation
In León last week, the Spanish National Cybersecurity Institute (INCIBE) hosted a live demonstration of its capabilities for detecting, mitigating, and responding to cyber incidents. INCIBE, which...
View ArticleCyber insurance price hikes stabilize as insurers expect more from CISOs
Cyber insurance costs have stabilized over the past year following a period of rate hikes driven in large part by increased ransomware attacks. During the past few years, insurance payouts exceeded...
View ArticleKaspersky’s US customers receive ‘UltraAV’ swap, raising red flags
Months after the US government banned Kaspersky Lab products, some users report that their antivirus software was replaced without notice by “UltraAV,” a relatively unknown program. Users took to...
View ArticleUS to ban connected vehicle tech from China, Russia due to national security...
The Biden administration is looking to ban the import of connected vehicles and associated technologies from China and Russia, calling them the “countries of security concerns.” The prohibiting rule...
View ArticleDownload our AI security posture management (AI-SPM) enterprise buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what the various AI security posture management (AI-SPM) tools can do for their organizations and how to...
View ArticleSweden accuses Iran of SMS revenge hack
The Swedish Prosecutor’s Office has announced that a preliminary investigation carried out with the Swedish Security Service (Säpo) has concluded that the Iranian state, via the Islamic Revolutionary...
View ArticleCrowdStrike defends access to Windows kernel at US Congressional hearing into...
A CrowdStrike executive told a US Congressional hearing on Tuesday that the company’s endpoint detection and response sensor has to continue accessing the Windows kernel, despite criticism by some...
View ArticleWhen technical debt strikes the security stack
Most veteran CISOs implicitly understand the concept of technical debt and how it increases the risk across IT assets and applications. The idea is simple in theory, if difficult in practice to...
View ArticleCrowdStrike outage redefines EDR market emphasis
July’s infamous CrowdStrike outage has shaken up the endpoint detection and response (EDR) marketplace by placing a much greater emphasis on stability and reliability. But industry analysts and other...
View ArticleThousands of internet-exposed fuel gauges could be hacked and dangerously...
Thousands of automatic tank gauge (ATG) systems used in gas stations, power plants, airports, military bases, and other critical infrastructure facilities are exposed to the internet and using...
View ArticleThe critical importance of choosing the right data center firewall
Data centers are the backbone of modern IT architecture. However, as organizations increasingly rely on cloud computing, remote workers, and hybrid environments, traditional security solutions...
View ArticleAccenture forges own path to improve attack surface management
Accenture’s award-winning attack surface management program strengthens the company’s resiliency and security posture. As a global consulting and technology company, Accenture understands how quickly...
View ArticleZero trust, not no trust: A practical guide to implementing ZTNA
Zero-trust network access (ZTNA) is a security model that follows the principle of “never trust, always verify.” Instead of relying on traditional network perimeter security, ZTNA mandates that all...
View ArticleBeware the risks of vulnerable VPNs: update, maintain, monitor, and protect
We live in a world that is always on and always vulnerable. We need remote access to allow employees to work from anywhere, but that also means that our networks are exposed to everywhere. If you...
View ArticleAttackers impersonate freight companies in double brokering scams
Scammers are increasingly impersonating transportation companies to bid on shipments and then contract the job at a lower price to potentially less reliable carriers. This type of scam, known as...
View ArticleChinese hackers allegedly hacked US ISPs for cyber espionage
Chinese state-sponsored hackers have been found to have gained access to multiple US internet service providers (ISPs) to establish persistence and carry out cyber espionage activities. The Chinese...
View ArticleSAP SE revamps application security scanning using simulation and automation
As a result, SAP is always evolving its security measures to stay ahead of cyber threats. The company recently launched a dynamic application security scanning system to detect vulnerabilities that...
View ArticleHere are the top 3 causes of breaches – and how to mitigate them
The stakes are higher than ever for organizations worldwide regarding cybersecurity incidents, as the fallout of such incidents is becoming more costly and complex. According to the Fortinet 2024...
View ArticleCarrier Global takes collaborative approach to cybersecurity
For enterprises that do business worldwide, cybersecurity can be a complex undertaking, as risks such as phishing attacks by threat actors continuously evolve across the globe to bypass traditional...
View ArticleA critical Nvidia Container Toolkit bug can allow a complete host takeover
Nvidia has patched a critical vulnerability affecting its container toolkit (formerly known as Nvidia docker). The vulnerability — tracked as CVE-2024-0132 — has been assigned a CVSS score of 9 out of...
View Article