CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

November 23, 2021

What CISOs can learn from the US Navy insider who stole nuclear secrets

The theft of government secrets by Jonathan Toebbe and others raises the question: How should CISOs deal with insider threats who have had insider threat training? Read more ▶

Image: Sponsored by Specops Software: Get Serious About Cyber Security with Specops Password Policy Tools

Sponsored by Specops Software: Get Serious About Cyber Security with Specops Password Policy Tools

On average a data breach isn't discovered for 280 days and costs a company 3.86M USD. Password security is key to preventing cyberattack. Test Out Specops Password Policy Tools in your Active Directory to start blocking 2B+ known breached passwords, preventing password repetition, entropy, and more.

NIST workshop provides clues to upcoming software supply chain security guidelines

Experts at a NIST-sponsored workshop weigh in on what might be in the final version of the Biden executive-order-mandated supply chain security guidelines.

California state CISO: the goal is “operating as a whole government”

Partnerships with other state entities elevate security capabilities and enhance information sharing to provide better security overall, says California state CISO Vitaliy Panych.

Image: 9 cloud and on-premises email security suites compared

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

How CISOs escape the cost center trap

Even as the CISO role is becoming more business-focused, in many organizations the notion of security as purely a cost center persists. Here’s how savvy CISOs can turn that around.

Void Balaur explained—a stealthy cyber mercenary group that spies on thousands

Unlike other groups, Void Balaur will target individuals and organizations in Russian-speaking countries and seems to have intimate knowledge of telecom systems.

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

CSO
Facebook Twitter LinkedIn
© 2021 CSO
140 Kendrick Street, Building B
Needham, MA 02494