CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 18, 2021

Microsoft's very bad year for security: A timeline

Microsoft has had a horrible 2021, with vulnerabilities impacting its biggest services. Read more ▶

Image: Sponsored by HP: Redefining Home Security

Sponsored by HP: Redefining Home Security

It’s been quite a year. Along with adapting to a pandemic that shut the world inside and brought on a seismic shift in social norms, more people than ever are working from home.

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

REvil ransomware explained: A widespread extortion operation

The REvil group, a.k.a. Sodinokibi, re-victimizes its targets by threatening to release stolen data even after the initial ransom demand is paid.

Image: McGovern Prize Winners Tackle Health Inequity and Social Bias

McGovern Prize Winners Tackle Health Inequity and Social Bias

Meet the first-ever CHM Patrick J. McGovern Tech For Humanity Prize Changemakers, Mercy Nyamewaa Asiedu and Michael Bernstein and learn about how they’re developing new technology to make the world a better place. Tune in Tuesday, October 19 at 11 a.m. PST.

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.

CIO’s Future of Edge Computing Summit

If you don’t have a strategy in place for edge computing now, you’ll need one soon: Researchers predict that 90 percent of industrial enterprises will use edge computing by 2022. Here’s where you can figure out your strategy on how to use edge computing to deliver business speed and value — while also mitigating security risks. #CIOFutureOfEdge

7 VPN alternatives for securing remote network access

Virtual private networks have shortcomings when it comes to protecting remote network connections. These technologies can replace or supplement it.

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

Chinese APT group IronHusky exploits zero-day Windows Server privilege escalation

The attackers used the exploit to deploy a new remote shell Trojan called MysterySnail.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494