CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

August 13, 2021

OPSEC examples: 6 spectacular operational security failures

Even savvy dark web denizens sometimes fail to cover their tracks. Read more ▶

Image: 5 best practices for designing application logs

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

The most dangerous (and interesting) Microsoft 365 attacks

APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from emails, SharePoint, OneDrive, and other applications.

CISO job satisfaction: Finding meaning in the mission

The top security job is highly stressful and sometimes thankless, but it can also provide great satisfaction—especially for mission-driven CISOs.

Image: Ransomware recovery: 8 steps to successfully restore from backup

Ransomware recovery: 8 steps to successfully restore from backup

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.

6 vulnerabilities Microsoft hasn't patched (or can't)

Your IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494