CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

February 26, 2022

CISOs, beware of spyware tools for illicit competitive intelligence

Two recent court cases expose the capabilities of publicly available spyware and how businesses and governments use them for malicious purposes. Read more ▶

Image: Shifting security left at WGU

Shifting security left at WGU

“We have better security success when the developers are taking part in it,” says James Chandler, VP of security for Western Governors University.

ShadowPad has become the RAT of choice for several state-sponsored Chinese APTs

New research links the ShadowPad remote-access Trojan to China's Ministry of State Security and the People's Liberation Army.

Microsoft changes default settings to improve network security

Here's what IT and security admins for Microsoft networks need to know about recent changes to Office and Windows.

Image: 4 security concerns for low-code and no-code development

4 security concerns for low-code and no-code development

Low code does not mean low risk. By allowing more people in an enterprise to develop applications, low-code development creates new vulnerabilities and can hide problems from security.

Why DevOps pipelines are under attack and how to fight back

NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here's advice to reduce risk to your DevOps processes.

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494