CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

August 12, 2021

Ransomware recovery: 8 steps to successfully restore from backup

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it. Read more ▶

Image: 5 best practices for designing application logs

5 best practices for designing application logs

Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.

CISO job satisfaction: Finding meaning in the mission

The top security job is highly stressful and sometimes thankless, but it can also provide great satisfaction—especially for mission-driven CISOs.

The most dangerous (and interesting) Microsoft 365 attacks

APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from emails, SharePoint, OneDrive, and other applications.

Image: 6 vulnerabilities Microsoft hasn't patched (or can't)

6 vulnerabilities Microsoft hasn't patched (or can't)

Your IT and security admins need to be aware of these unpatched Microsoft vulnerabilities so that they can mitigate them in other ways.

Recent shadow IT related incidents present lessons to CISOs

Employee use of unauthorized applications and services have resulted in high-profile data losses and exposure. CISOs need to understand why shadow IT exists before they can address it.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494