Latest articles for CSO magazine

Expired certificates cost businesses $15 million per outage

Expired certificates cost businesses $15 million per outage

The average global 5,000 company spends about $15 million to recover from the loss of business due to a certificate outage — and faces another…

Does security awareness training even work?

Does security awareness training even work?

The other day, I was in a room full of CIOs, CTOs and CISOs who — as an ice-breaking activity — were asked to share…

Healthcare firms three times more likely to see data breaches

Healthcare firms three times more likely to see data breaches

Companies in the healthcare sector are three times more likely to encounter data theft than the average firm, according to a report released this morning.The…

Debit cards lag credit cards in EMV migration, putting banks at risk

Debit cards lag credit cards in EMV migration, putting banks at risk

Three times as many credit cards will be chip-enabled by the end of the year as debit cards, making the slower banks bigger targets for…

Russian military attacked, possibly by Chinese cyber group

Russian military attacked, possibly by Chinese cyber group

Members of the Russian military have been receiving well-crafted phishing emails since mid-summer from attackers that use Chinese-language tools and Chinese command-and-control installations, according to…

As containers take off, so do security concerns

As containers take off, so do security concerns

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…

As containers take off, so do security concerns

As containers take off, so do security concerns

Containers offer a quick and easy way to package up applications and all their dependencies, and are popular with testing and development.According to a recent…

Corebot cleverly written botnet malware with growth potential

Corebot cleverly written botnet malware with growth potential

There’s a new botnet malware on the loose, called Corebot, that researchers believe has the potential to develop into a significant threat.The malware was first…

Travel apps riddled with security flaws

Travel apps riddled with security flaws

The top 10 travel apps in the iOS and Android app stores are all riddled with security flaws, according to a new report from Bluebox…

Attackers go on malware-free diet

Attackers go on malware-free diet

To avoid detection, some hackers are ditching malware and living “off the land” — using whatever tools are already available in the compromised systems, according…

MIT scores worst in cybersecurity

MIT scores worst in cybersecurity

In a cybersecurity survey of 485 large colleges and universities, the Massachusetts Institute of Technology came in at the bottom of the list.In a report…

Security experts mostly critical of proposed threat intelligence sharing bill

Security experts mostly critical of proposed threat intelligence sharing bill

This fall, the Senate is expected to take another look at the Cybersecurity Information Sharing Act, or CISA, but many security experts and privacy advocates…

Report: breached records count down this year

Report: breached records count down this year

The number of individual records compromised by data breaches has declined by 41 percent during the first half of this year, compared to the same…

EMV transition will still leave security gaps

EMV transition will still leave security gaps

This October, US merchants and payment providers are scheduled to switch to new, more secure, chip-based payments. But financial transactions aren’t going to become safer…

Ashley Madison still a top lure for scammers and crooks

Ashley Madison still a top lure for scammers and crooks

The Ashley Madison breach has been a Christmas-in-August present for spammers and scammers of all kinds, and your company could be the next target.Here are…

Court: FTC can take action on corporate data breaches

Court: FTC can take action on corporate data breaches

The US Court of Appeals has ruled that the FTC mandate to protect consumers against fraudulent, deceptive and unfair business practices extends to oversight of…

Study: 81% of large health care organizations breached

Study: 81% of large health care organizations breached

In the past two years, 81 percent of hospitals and health insurance companies have had a data breach, according to a report released by KPMG.”These…

Intel: Criminals getting better at data exfiltration

Intel: Criminals getting better at data exfiltration

Enterprises tend to be highly focused on keeping attackers out of their systems, but most of the actual damage happens not when the bad guys…

The Web’s ten most dangerous neighborhoods

The Web’s ten most dangerous neighborhoods

Wouldn’t it be convenient if all the spam and malware sites were all grouped together under one top-level domain — .evil, say — so that…

CSO burnout biggest factor in infosec talent shortage

CSO burnout biggest factor in infosec talent shortage

The real cause of the talent shortage in the information security field isn’t a lack of new people entering the profession, but retention and churn…

Amazon dumps Flash, and the Web is better off

Amazon dumps Flash, and the Web is better off

Amazon will stop accepting Flash ads on its advertising network on Tuesday, and it will help make the entire Web more secure, security experts say.According…

Phishing is a $3.7-million annual cost for average large company

Phishing is a $3.7-million annual cost for average large company

The average 10,000-employee company spends $3.7 million a year dealing with phishing attacks, according to a new report from the Ponemon Institute.The report, which surveyed…

Most corporate risk due to just 1% of employees

Most corporate risk due to just 1% of employees

Just 1 percent of employees are responsible for 75 percent of cloud-related enterprise security risk, and companies can dramatically reduce their exposure at very little…

LG phones most exposed to new Certifi-gate vulnerability

LG phones most exposed to new Certifi-gate vulnerability

More than 70 percent of Android phones from LG have a plugin installed that exposes them to the Certifi-gate remote support app vulnerability, where a…

Fraud rate doubles as cybercriminals create new accounts in users’ name

Fraud rate doubles as cybercriminals create new accounts in users’ name

To get more value out of stolen personal information, cybercriminals doubled their rate of account creation fraud this summer, according to a report report from…

Virtualization doubles the cost of security breach

Virtualization doubles the cost of security breach

When a security incident involves virtual machines in either a public or private cloud environment, the recovery costs double compared to that of a traditional…

Tips for protecting your business against cyber extortion

Tips for protecting your business against cyber extortion

CrytoLocker is malware cyber criminals use to encrypt the contents of a computer until users pay up.But that’s only one type of cyber extortion, according…

DRM could be making a comeback in the enterprise

DRM could be making a comeback in the enterprise

Digital rights management might be coming back to the enterprise, experts say, as long as usability issues don’t get in the way.You might remember the…

Report: ISIS-related cyber war reaches Alabama

Report: ISIS-related cyber war reaches Alabama

The war against Islamic State has resulted in a cyber attack on US soil, and other such attacks are likely, according to a new report…

DDoS attacks double as criminals leverage home routers, WordPress plugins

DDoS attacks double as criminals leverage home routers, WordPress plugins

The number of distributed denial-of-service attacks in the second quarter of this year was more than double that of last year, according to a new…