CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

May 06, 2021

The Microsoft Exchange Server hack: A timeline

Research shows plenty of unpatched systems remain. Here's how the attacks unfolded, from discovery of vulnerabilities to today's battle to close the holes. Read more ▶

Exclusive invite to CIO’s Future of Business Summit

Are you ready for the next disaster? Hear from leading CIOs about how they have reshaped their IT infrastructure and built stronger businesses for the future at CIO’s Future of Business Resilience Summit. May 11-12.

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it.

8 cybersecurity startups to watch

Security startups are often innovation leaders that attempt to solve critical and persistent problems. These are some of the most interesting ones to watch as they tackle issues around multicloud security, identity management, zero-trust, and more.

Image: How malicious Office files and abused Windows privileges enable ransomware

How malicious Office files and abused Windows privileges enable ransomware

Ransomware groups most often gain entry to Windows networks through malicious Office documents and then move laterally by abusing Windows privileges. Here's how to defend against both.

8 top identity and access management tools

Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments.

5 key qualities of successful CISOs, and how to develop them

CISOs today need significantly different skillsets to cybersecurity leaders of the past as they become more critical to business success.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494