CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

February 04, 2022

DHS creates Cyber Safety Review Board to review significant cybersecurity incidents

The CSRB will advise the President and Department of Homeland Security director, as well as review major security events starting with the Log4j exploits. Read more ▶

Image: Sponsored by Akamai and AT&T: How to Best Protect Multi-cloud and Hybrid Environments

BrandPost Sponsored by Akamai and AT&T

Sponsored by Akamai and AT&T: How to Best Protect Multi-cloud and Hybrid Environments

Take security into your own hands to protect applications, workloads and data across complex IT environments.

NPM JavaScript registry suffers massive influx of malware, report says

The NPM JavaScript registry has experienced a jump in malware, including packages related to data theft, crypto mining, botnets, and remote code execution, according to security company WhiteSource.

Startups to watch for 2022

Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.

Image: Don’t Fear Workplace Change. Lead it.

Don’t Fear Workplace Change. Lead it.

The workplace future is here. Hear from leading businesses on how they create agile, flexible, and intelligent work models. Every day of the event will assess current challenges around each of the following key themes and then, through keynotes, workshops and live Q&A, work to solve them.

Why buy now, pay later is the next big fraud risk for retailers

BNPL is booming, catching the eye of fraudsters who seek to exploit the BNPL process for malicious gain. Here is an overview of the risks BNPL fraud poses with strategies for mitigating threats.

Apple AirTag and other tagging devices add to CISO worries

Tagging devices such as Apple's AirTag can be misused by employees, criminals, and competitors to track people and devices in a way that puts organizations at risk.

Target shares its own web skimming detection tool Merry Maker with the world

The open-source tool simulates online browsing and shopping to identify malicious code meant to steal payment card information on retailers' websites.

5 steps to run a successful cybersecurity champions program

Here's how others have launched successful cybersecurity champions programs to promote and encourage positive security cultures across an organization.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494