CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

December 24, 2021

How to detect Log4Shell exposure and exploitation

Software dependencies and third-party products make detecting Log4j exploits tough, but this advice and some specialized tools can help. Read more ▶

Image: The Apache Log4j vulnerabilities: A timeline

The Apache Log4j vulnerabilities: A timeline

The Apache Log4j vulnerability has impacted organizations around the globe. Here is a timeline of the key events surrounding the Log4j exploit as they have unfolded.

18 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management, zero-trust, and more.

6 resume mistakes CISOs still make

The top security job has evolved from a technology-focused role into an executive position. Does your resume reflect that shift?

Image: CISOs, what's in your travel security program?

CISOs, what's in your travel security program?

It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.

8 top identity and access management tools

Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.

15 open source GitHub projects for security pros

GitHub has a ton of open-source options for security professionals, with new entries every day. Add these tools to your collection and work smarter.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494