CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 07, 2022

5 things security pros want from XDR platforms

New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. Read more ▶

Image: Sponsored by Fortinet: Four Key Ways CISOs can Strengthen OT Security

Sponsored by Fortinet: Four Key Ways CISOs can Strengthen OT Security

As CISOs realize the need to improve their OT security practices, there are 4 areas where they should consider focusing.

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

An updated pipeline security directive is underway, reflecting TSA struggles

The TSA directives issued after the Colonial Pipeline attack have been widely criticized, but the agency is working with the industry to improve them.

Image: Reduce Your Risk With a Unilateral Security Approach

BrandPost Sponsored by Fortinet

Reduce Your Risk With a Unilateral Security Approach

Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSO’s Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

Smart factories unprepared for cyberattacks

Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.

NIST names new post-quantum cryptography standards

One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494