Loading...
The day's top cybersecurity news and in-depth coverage
July 29, 2022
Malware-laden Google Play apps, a Russian hijack of cloud storage services, and âflawsâ that arenât really flaws in the Okta platform all made for interesting security research this month. Read more â¶
Development teams can secure every line of code with breakthrough IAST technology that continuously detects and prioritizes vulnerabilities and provides guidance on how to eliminate risks. All with industry leading accuracy, efficiency, scalability, and coverage. Learn more!
Risks increase as the world becomes more digital, regulated, and interconnected, but you can take steps to reduce their impact.
An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.
Follow this advice to minimize stress when recovering credentials, systems and settings after a ransomware or other cyberattack.
These commercial and open-source tools will scan code and create software bills of materials automatically.
Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold.
To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop.
© 2024