Top 5 security risks of Open RAN
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
Top 5 security risks of Open RAN Read More »
Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.
Top 5 security risks of Open RAN Read More »
Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.
6 signs your IAM strategy is failing, and how to fix it Read More »
Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.
Adversarial machine learning explained: How attackers disrupt AI and ML systems Read More »
Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.
9 ways hackers will use machine learning to launch attacks Read More »
Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.
7 machine identity management best practices Read More »
Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.
Fantastic Open Source Cybersecurity Tools and Where to Find Them Read More »
The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.
What is the cyber kill chain? A model for tracing cyberattacks Read More »
Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.
How attackers sidestep the cyber kill chain Read More »
NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to your DevOps processes.
Why DevOps pipelines are under attack and how to fight back Read More »
Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.
Data residency laws pushing companies toward residency as a service Read More »
The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.
Ransomware recovery: 8 steps to successfully restore from backup Read More »
CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.
Botnet attacks on APIs: Why most companies are unprepared Read More »
CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API attacks.
How API attacks work, and how to identify and prevent them Read More »
CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.
Tips and tactics of today’s cybersecurity threat hunters Read More »
CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do it and how to kick them out for good.
5 ways attackers counter incident response, and how to stop them Read More »