CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 09, 2022

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings. Read more ▶

Image: Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

At PwC, we met the cyber talent crisis head-on by developing a training program that curated training content from the world’s leading vendors. Learn how ProEdge, a PwC product, provides cyber-specific experiential learning opportunities that can help you prepare for tomorrow’s threats today.

Attacker groups adopt new penetration testing tool Brute Ratel

APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.

APT campaign targeting SOHO routers highlights risks to remote workers

The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.

Image: Reduce Your Risk With a Unilateral Security Approach

Reduce Your Risk With a Unilateral Security Approach

Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSO’s Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:

NIST names new post-quantum cryptography standards

One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.

How to keep attackers from using PowerShell against you

New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.

LockBit explained: How it has become the most popular ransomware

Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494