CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

January 11, 2022

New Log4Shell-like vulnerability impacts H2 Java SQL database

Researchers warn of critical Java flaw impacting the console of the H2 Java SQL database. Users are advised to update their H2 database to mitigate remote code execution risk. Read more ▶

Image: Sponsored by Fortinet: Large Fuel Distribution Company Refines Its Network Performance with Fortinet

BrandPost Sponsored by Fortinet

Sponsored by Fortinet: Large Fuel Distribution Company Refines Its Network Performance with Fortinet

From the oil rig to the gas pump, most large fuel distribution companies are involved in just about every aspect of fuel exploration, extraction, production, and distribution.

FTC, SEC raise legal risks surrounding the log4j flaw

The U.S. Federal Trade Commission also threatened possible legal action for companies that don't address the risk from the Log4j vulnerabilities.

MITRE: To test and gain confidence in MSSPs, use ATT&CK framework

Companies have greater confidence in their own security teams than in MSSPs, according to a new survey. To better evaluate service provider capabilities, companies can apply techniques used by the ATT&CK (adversarial tactics, techniques, and common knowledge) assessment framework to MSSPs, MITRE says.

Image: 7 hot cybersecurity trends (and 2 going cold)

7 hot cybersecurity trends (and 2 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie.

5 top hybrid cloud security challenges

Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.

Protecting PII: Examples, laws, and standards

Personally identifiable information (PII), is any piece of data that could be used—either alone or when combined with other data—to identify an individual. Some types of PII are obvious, such as a name or Social Security number, but others are more subtle.

Top 8 cybersecurity predictions for 2022

Seeing opportunities in the mass move to remote work, cyberattackers are updating their tactics, compelling security leaders to respond. Experts make their predictions about threat reduction, compliance, supply chain management, security spending and more.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494