The day's top cybersecurity news and in-depth coverage
June 18, 2022
By setting yourself up as the defender, the solver of problems, you cast your business colleagues as hapless victims or, worse, threats. This is not a useful construct for engagement. Read more â¶
Ransomware attacks can be stopped â but only if security teams have the right tools in place.
Major technology platforms have joined 34 signatories in committing to the EU Commissionâs attempts to fight online disinformation by removing financial incentives and empowering researchers and fact checkers.
Sigma rules allow you to detect anomalies in log events and identify suspicious activity.
Keep up with news of CSO, CISO, and other senior security executive appointments.
These common missteps and misconceptions may be keeping your vulnerability management from being the best it can be.
A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.
Tracking postponements, cancellations, and conferences gone virtual â CSO Onlineâs calendar of upcoming security conferences makes it easy to find the events that matter the most to you.