CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

December 02, 2021

China's Personal Information Protection Law presents challenges for CISOs

PIPL's data localization mandate places unique requirements on businesses operating in China, and regulators have great leeway to assess fines. Read more ▶

Image: Sponsored by Logicalis: Are you prepared for the future of cybercrime?

Sponsored by Logicalis: Are you prepared for the future of cybercrime?

Join Theresa Payton, former White House CIO and security visionary, for a webinar investigating the increase in cyberattacks, mistakes that organizations make that increase their exposure, insider threats, and more. Reserve your spot today.

Microsoft announces new security, privacy features at Ignite

Microsoft has consolidated some security tools under the Defender brand and added security and privacy features and products. Here's a look at what's new.

New HP MFP vulnerabilities show why you should update and isolate printers

Researchers have discovered two dangerous vulnerabilities in HP multifunction printers that use its FutureSmart firmware, including one that is exploitable remotely.

Image: Sideloading attacks explained, and why you should train users to spot them

Sideloading attacks explained, and why you should train users to spot them

A new sideloading malware campaign targeting Windows uses phishing and social engineering tactics that can be difficult for users to spot.

13 traits of a security-conscious board of directors

A CISO's success (and job longevity) is often dependent on support from the board of directors. Answers to these questions will reveal how security savvy a BoD is.

GoDaddy WordPress data breach: A timeline

Domain registrar GoDaddy recently announced a data breach impacting 1.2 million customers via its Managed WordPress hosting environment. Here's how the breach is unfolding.

5 tips for reducing false positive security alerts

SOC analysts spend too much time and effort chasing security alerts that incorrect indicate a vulnerability where none exists.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494