CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

September 17, 2021

Top cybersecurity M&A deals for 2021

The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings. Read more ▶

Image: Sponsored by CIS: Prepare for Your Next Cybersecurity Compliance Audit with CIS Resources

BrandPost Sponsored by CIS

Sponsored by CIS: Prepare for Your Next Cybersecurity Compliance Audit with CIS Resources

The Center for Internet Security offers multiple, no-cost resources to help organizations create a compliance plan and build a cyber defense.

How chemical manufacturer Celanese secures its IT and OT environments

Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization must build a unique ecosystem to secure and defend against attacks. Learn how CISO Jennifer Watson manages security complexity and velocity to minimize risks.

3 former US intel officers turned cyber mercenaries plead guilty: An insider threat case study

Three U.S. nationals, working as cyber mercenaries on behalf of the United Arab Emirates, have pleaded guilty to exploiting U.S. entities using U.S.-controlled technologies.

Image: How APTs become long-term lurkers: Tools and techniques of a targeted attack

How APTs become long-term lurkers: Tools and techniques of a targeted attack

A new McAfee report details the tools and techniques an APT group used to go undetected on a client network for over a year.

How to find a security-savvy MSP

Not all managed service providers are strong on security. Here's how to weed out those that will put your small- to medium-sized business at risk.

8 pitfalls that undermine security program success

Don’t let these easy-to-overlook mistakes trip up your security strategy.

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

How CISOs and CIOs should share cybersecurity ownership

CISOs and CIOs weigh in on how their cybersecurity responsibilities are evolving with changes in the business environment and threat landscape.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494