CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 22, 2022

Auth0’s Matias Woloski on prioritizing the developer experience

The Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more. Read more ▶

Image: Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

At PwC, we met the cyber talent crisis head-on by developing a training program that curated training content from the world’s leading vendors. Learn how ProEdge, a PwC product, provides cyber-specific experiential learning opportunities that can help you prepare for tomorrow’s threats today.

How Microsoft Purview can help with ransomware regulatory compliance

Microsoft's renamed compliance portal provides guidance and rule-setting capability to help comply with ransomware and other security and privacy requirements.

How the Secure Software Factory Reference Architecture protects the software supply chain

This breakdown of the Cloud Native Computing Foundation's secure software factory guidance focuses on software provenance and build activities.

Image: New APT actor ToddyCat hits government and military targets in Europe and Asia

New APT actor ToddyCat hits government and military targets in Europe and Asia

The previously undocumented APT group has been targeting high-profile organizations in Asia and Europe for over a year.

Cato Networks offers new capability for network-based ransomware protection

New machine learning algorithms scan server traffic to detect and eliminate ransomware attacks across Cato's customer network.

Space-based assets aren’t immune to cyberattacks

Russia's attack on Viasat satellites exposed how vulnerable space-based assets are and the potential for spillover damage.

Cybersecurity researchers face real-life threats

Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494