Loading...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
July 12, 2024
6 tips for consolidating your IT security tool set
Spending sprees, acquisitions, siloed departments, and escalating security concerns have many CISOs drowning in security solutions. Hereâs how to rein in the tool sprawl and ensure enhanced security as you streamline your security stack. Read more
What is the CIA triad? A principled framework for defining infosec policies
The CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organizationâs efforts and policies aimed at keeping its data secure â but tradeoffs are necessary in real-world scenarios. Read more
Top 10 open source software risks â and how to mitigate them
Open source software is the bedrock of modern software development, but it can also be a weak link in the software supply chain. Here are the biggest risks â and tips on how to safely use OSS components. Read more
Ransomware attackers exploit year-old backup vulnerability
A post-mortem of a recent ransomware attack illustrates the continued importance of basic security controls such as patching in withstanding an evolving cybercrime threat. Read more
Get more from the voice of CSOs and IT leadership
Read more from CSO delivered to your inbox. Subscribe now.
Japan aerospace agency provides details of October data breach
Most observers attribute the attack, which leveraged VPN and Microsoft 365 security holes, to state actors working for China. Read more
Hackers steal data of 200k Lulu customers in an alleged breach
IntelBroker shared snippets of data from the breach of Lulu Hypermarket, threatening a full database leak at a future date. Read more
Python GitHub token leak shows binary files can burn developers too
Scrubbing tokens from source code is not enough, as shown by the publishing of a Python Software Foundation access token with administrator privileges to a container image on Docker Hub. Read more
© 2024