Latest articles for CSO magazine

Top 5 security risks of Open RAN

Top 5 security risks of Open RAN

Aug 15, 2022

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.

6 signs your IAM strategy is failing, and how to fix it

6 signs your IAM strategy is failing, and how to fix it

Jul 5, 2022

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here’s how to spot and avoid the worst of them.

(Image via Adobe Firefly.)

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Jun 28, 2022

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Jun 13, 2022

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors…

dummy-img

7 machine identity management best practices

May 24, 2022

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

dummy-img

Fantastic Open Source Cybersecurity Tools and Where to Find Them

May 19, 2022

Open source software plays a key role in keeping data centers secure. Here are just a few projects making a difference.

dummy-img

What is the cyber kill chain? A model for tracing cyberattacks

Apr 14, 2022

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

dummy-img

How attackers sidestep the cyber kill chain

Mar 7, 2022

Many of the most popular cyberattacks don’t follow all the steps of the cyber kill chain, but you have other methods to detect threats.

dummy-img

Why DevOps pipelines are under attack and how to fight back

Feb 22, 2022

NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here’s advice to reduce risk to…

dummy-img

Data residency laws pushing companies toward residency as a service

Jan 26, 2022

Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.

dummy-img

Ransomware recovery: 8 steps to successfully restore from backup

Aug 12, 2021

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here’s how to do it.

dummy-img

Botnet attacks on APIs: Why most companies are unprepared

Jun 29, 2021

CSO–The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.

dummy-img

How API attacks work, and how to identify and prevent them

May 21, 2021

CSO–Attackers know how to get around WAFs and API gateways when targeting APIs. Here’s how some companies are coping with the rapid increase in API…

dummy-img

Tips and tactics of today’s cybersecurity threat hunters

May 3, 2021

CSO–Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond…

dummy-img

5 ways attackers counter incident response, and how to stop them

Feb 9, 2021

CSO ONLINE–IR has become a chess match with attackers who can cleverly spoil responders’ efforts and keep a foothold in systems. Here’s how they do…

dummy-img

How strong, flexible data protection controls can help maintain regulatory compliance

Feb 9, 2021

CSO ONLINE–An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

dummy-img

Supply chain attacks show why you should be wary of third-party providers

Feb 4, 2021

CSO ONLINE–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

dummy-img

CPRA explained: New California privacy law ramps up restrictions on data use

Dec 21, 2020

CSO ONLINE–The California Privacy Rights Act more closely aligns with the EU’s General Data Protection Regulation. Mid-sized companies not yet GDPR compliant face the biggest…

How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Nov 26, 2020

CSO–Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here’s how several companies have minimized their risk.

dummy-img

How to protect backups from ransomware

Nov 2, 2020

CSO–Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

dummy-img

Supply chain attacks show why you should be wary of third-party providers

Oct 29, 2020

CSO–The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

dummy-img

IBM, Intel, AMD take different routes to hardware-based encryption

Aug 24, 2020

CSO–So-called confidential computing approaches allow data to remain encrypted while in use. That’s best done in hardware, and IBM, AMD and Intel are following different…

dummy-img

Getting started with security automation

Aug 14, 2020

CSO–Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here’s how three…

dummy-img

California Consumer Privacy Act (CCPA): What you need to know to be compliant

Jul 7, 2020

CSO–California’s new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

dummy-img

8 ways to get more life out of an old SIEM

Jun 1, 2020

CSO–Can’t update your old security information and event management system now? Use this advice to maintain its effectiveness.

dummy-img

AI-powered deception technology speeds deployment, improves results

Apr 13, 2020

CSO–Aflac says artificial intelligence made its honeypot rollout faster, less complicated, and it produces high-quality alerts. A healthcare facility deploys deception technology for protection during…

dummy-img

8 PCI DSS questions every CISO should be able to answer

Mar 3, 2020

CSO–Any organization that processes credit card payments risks large fines and loss of their merchant accounts if they are not PCI DSS compliant when a…

dummy-img

9 CCPA questions every CISO should be prepared to answer

Feb 3, 2020

Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to…

dummy-img

What you need to know about the new OWASP API Security Top 10 list

Nov 14, 2019

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk.

dummy-img

Directory traversal explained: Definition, examples and prevention

Oct 7, 2019

Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making…