CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 21, 2022

Cybersecurity researchers face real-life threats

Investigations into both cybercriminal and nation-state actors can have consequences. Some researchers have upgraded their physical security. Read more ▶

Image: Sponsored by Carbonite ARM: Never worry again when disaster might strike with Carbonite Recover®

Sponsored by Carbonite ARM: Never worry again when disaster might strike with Carbonite Recover®

Instead of living with the risk of unexpected downtime, businesses can trust Carbonite for disaster recovery solutions that fit their needs and resources available. Learn how Carbonite® Recover and Carbonite® Managed Disaster Recovery service reduces the risk of unexpected downtime.

Space-based assets aren’t immune to cyberattacks

Russia's attack on Viasat satellites exposed how vulnerable space-based assets are and the potential for spillover damage.

6 tips for effective security job postings (and 6 missteps to avoid)

With demand for security professionals outstripping supply, employers need to ensure their job postings hit the mark. Here’s how to write a security job posting that attracts qualified candidates.

Image: Auth0’s Matias Woloski on prioritizing the developer experience

Auth0’s Matias Woloski on prioritizing the developer experience

The Auth0 co-founder and CTO discusses the company’s focus on developer experience, the possibilities for decentralized identity, innovations the Auth0 Lab team is looking at now, and more.

Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking is the unauthorized use of a computer to mine cryptocurrency. Here’s how it works, why it's so popular with criminal hackers, and what you can do to stop it.

Andy Ellis: We don’t need another infosec hero

By setting yourself up as the defender, the solver of problems, you cast your business colleagues as hapless victims or, worse, threats. This is not a useful construct for engagement.

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494