CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

June 01, 2022

How to audit Microsoft Active Directory

Patching alone won't fix all known Active Directory vulnerabilities. Here are the steps to audit your Active Directory domains and shore up weaknesses. Read more ▶

Image: Sponsored by Fairfax County Economic Development Authority: Learn Why Fairfax County, VA Is a Major Tech Hub

Sponsored by Fairfax County Economic Development Authority: Learn Why Fairfax County, VA Is a Major Tech Hub

On the heels of Amazon’s HQ2 landing in NoVa, major tech companies like Microsoft and Google and unicorn companies like ID.me are realizing the benefits of Fairfax County. Our local economy and location include an ecosystem of incubators, venture capital/private equity, and workforce development.

5 top deception tools and how they ensnare attackers

Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.

HiQ v LinkedIn court ruling will have a material effect on privacy

A U.S. appeals court has ruled that hiQ's scraping of public LinkedIn data is not a violation of the U.S. Computer Fraud and Abuse Act.

Image: Experts are gathering at CIO’s Future of Work Summit | June 14-15

Experts are gathering at CIO’s Future of Work Summit | June 14-15

The world’s leading IT influencers are coming together to discuss how Fortune 500 companies are preparing for changes to the workplace and technology. Join us on June 14-15 for this experts-only summit, and learn from the best in enterprise IT.

Linux malware is on the rise—6 types of attacks to look for

Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.

The Open Source Software Security Mobilization Plan: Takeaways for security leaders

The plan from the Linux Foundation and OpenSSF presents three goals to improve open-source software security during development and more effectively address vulnerabilities.

Conti ransomware explained: What you need to know about this aggressive criminal group

The Conti ransomware group is less likely to help victims restore encrypted files and more likely to leak exfiltrated data.

How Costa Rica found itself at war over ransomware

Costa Rica failed to implement the cyber-preparedness strategy that it laid out five years ago and now serves as an example not only to other Latin American nations but also to the world.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494