CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

December 25, 2021

6 spectacular operational security failures

Even savvy dark web denizens sometimes fail to cover their tracks. Read more ▶

Image: How to detect Log4Shell exposure and exploitation

How to detect Log4Shell exposure and exploitation

Software dependencies and third-party products make detecting Log4j exploits tough, but this advice and some specialized tools can help.

Cybersecurity salaries: What 8 top security jobs pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check.

The 7 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first.

Image: The case for a SaaS bill of material

The case for a SaaS bill of material

A SaaSBOM will provide greater visibility into the components of cloud-based software infrastructure. This proposal shows how to begin to develop one.

How CISOs and CIOs should share cybersecurity ownership

CISOs and CIOs weigh in on how their cybersecurity responsibilities are evolving with changes in the business environment and threat landscape.

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494