Loading...
CSO US First Look
The day's top cybersecurity news and in-depth coverage
May 13, 2024
Ridding your network of NTLM
The path to eradicating this ancient protocol and security sinkhole wonât be easy, but the time has come for its complete eradication. Read more
Sponsored by Zscaler: Breaches galore â why a proven platform for Zero Trust is needed
Organizations need a proven platform for zero trust. But before we dive into why that is the case, we must first answer two important questions. Read more
Google Chrome gets a patch for actively exploited zero-day vulnerability
Details of the use-after-free memory vulnerability were not publicly released, but Google says itâs aware an exploit for the bug exists. Read more
Dell data breach exposes data of 49 million customers
The company says the breach compromised non-critical customer data and involved no sensitive personal or financial information. Read more
Get more from the voice of CSOs and IT leadership
Read more from CSO delivered to your inbox. Subscribe now.
Social engineering: Definition, examples, and techniques
Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs. Read more
Some strategies for CISOs freaked out by the specter of federal indictments
Experts at this year's RSA Conference offered strategies to help CISOs cope with the prospect of facing federal indictments over their handling of cyber incidents. Read more
Strong CIO-CISO relations fuel success at Ally
CIO Sathish Muthukrishnan and CISO Donna Hart have forged a partnership steeped in Allyâs culture of radical candor that keeps the financial services firm secure and innovative. Read more
© 2024