CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

May 16, 2022

12 steps to building a top-notch vulnerability management program

Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track. Read more ▶

Image: Sponsored by Microsoft Security: How to Increase Your Confidence in Cloud Security with Microsoft

BrandPost Sponsored by Microsoft Security

Sponsored by Microsoft Security: How to Increase Your Confidence in Cloud Security with Microsoft

Five Eyes nations warn MSPs of stepped-up cybersecurity threats

The warning likely comes in response to an increase in attacks on managed service providers, through which threat actors can access their clients.

Intel bets big on security as a service for confidential computing

At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography.

Image: The US federal cybersecurity bureaucracy: A guide

The US federal cybersecurity bureaucracy: A guide

A high-level look at the national offices and organizations involved in protecting the US from cyber threats.

7 top software supply chain security tools

These tools will help identify vulnerabilities and threats posed by third-party code through software composition analysis and SBOM creation.

A year later, Biden’s cybersecurity executive order driving positive change

Notable experts say the cybersecurity executive order has improved the nation's security posture, but more work is to be done.

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494