CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 08, 2022

U.S. and UK warn local governments, businesses of China's influence operations

China uses personal, business and political relationships to gather information and influence actions. U.S. and UK government agencies urge caution. Read more ▶

Image: Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

Sponsored by PriceWaterhouseCoopers LLP: How can organizations deal with a cyber skills shortage?

At PwC, we met the cyber talent crisis head-on by developing a training program that curated training content from the world’s leading vendors. Learn how ProEdge, a PwC product, provides cyber-specific experiential learning opportunities that can help you prepare for tomorrow’s threats today.

Splashtop teams with Acronis for remote security support

Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.

Revelstoke’s SOAR to improve case management with replicable sub-workflows

The company’s Case Automation Security Execution (CASE) management platform will use its in-house unified data layer (UDL) to develop and deploy automated, logic-based, sub-workflows for replication.

Image: Reduce Your Risk With a Unilateral Security Approach

Reduce Your Risk With a Unilateral Security Approach

Is your cybersecurity approach stuck in a reactive stance? Lack of information security influence and a siloed approach to decision-making are common obstacles. Register for CSO’s Future of #Cybersecurity Summit to reduce your vulnerability with unilateral risk management tips from Lenovo, Atlassian, MITRE Labs & Under Armour. Sign up today using the link below:

Smart factories unprepared for cyberattacks

Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

An updated pipeline security directive is underway, reflecting TSA struggles

The TSA directives issued after the Colonial Pipeline attack have been widely criticized, but the agency is working with the industry to improve them.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494