CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

February 15, 2021

How ransomware negotiations work

Here's what experienced negotiators say your organization should expect if it ever needs to pay a ransomware demand. Read more ▶

Image: Okta CEO: Here’s where cloud identity management is headed

Okta CEO: Here’s where cloud identity management is headed

Todd McKinnon, CEO and founder of Okta, talks about the road ahead for his company and the future of identity and access management in the cloud.

Inside cybersecurity’s shelfware problem

Sometimes underutilization of security software and services is a deliberate, strategic choice; more often it's a cause for concern.

How to harden Microsoft Edge against cyberattacks

Chromium-based Edge gives enterprises the opportunity to standardize on one browser. Here are the key security settings you need to know.

Image: 5 ways attackers counter incident response, and how to stop them

5 ways attackers counter incident response, and how to stop them

IR has become a chess match with attackers who can cleverly spoil responders' efforts and keep a foothold in systems. Here's how they do it and how to kick them out for good.

How DDoS attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
492 Old Connecticut Path
Framingham, MA 01701