CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

May 25, 2022

Patching the latest Active Directory vulnerabilities is not enough

Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities. Read more ▶

Image: Sponsored by March Networks: A Linux-based Video Surveillance Solution

Sponsored by March Networks: A Linux-based Video Surveillance Solution

When it comes to video surveillance, a Linux OS can provide increased security and reliability. The X-Series Hybrid Recorders, a powerful new recording platform from global video surveillance leader March Networks, features an embedded Linux OS and end-to-end encryption for increased security.

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

IDaaS explained: How it compares to IAM

IDaaS is a cloud-based consumption model for IAM. It offers cost, scalability, and other advantages, but it also comes with its own risks.

Image: Experts are gathering at CIO’s Future of Work Summit | June 14-15

Experts are gathering at CIO’s Future of Work Summit | June 14-15

The world’s leading IT influencers are coming together to discuss how Fortune 500 companies are preparing for changes to the workplace and technology. Join us on June 14-15 for this experts-only summit, and learn from the best in enterprise IT.

Exium expands SASE, 5G-based security for midsize enterprise networks

The on-premises module offers new capabilities, based on 5G standards, for midsize businesses.

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

DOJ: Good faith security research won’t be charged under Computer Fraud and Abuse Act

The U.S. Department of Justice revises its policy regarding charging violations of the CFAA. Good faith security research will no longer be charged.

What is cryptography? How algorithms keep information secret and safe

Cryptography is the art of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Security and privacy laws, regulations, and compliance: The complete guide

This handy directory provides summaries and links to the full text of each security or privacy law and regulation.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494