CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

April 15, 2022

The security user experience (SUX)

Security processes that treat the very users we protect as unwanted burdens and alienate them in the process are a path to failure. Read more ▶

Image: Top cybersecurity M&A deals for 2022

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.

It's time to re-evaluate your 2FA setup on Microsoft networks

Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?

Balooning growth of digital identities exposing organizations to greater cybersecurity risk

New enterprise initiatives are driving up the number of human and digital identities, increasing security risks.

Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

99% of cloud identities are overly permissive, opening door to attackers

Palo Alto Unit 42 report highlights five threat groups targeting cloud infrastructure and reveals their credential-focused attack methods.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494