Latest articles for CSO magazine

dummy-img

5 ways to hack blockchain in the enterprise

Jul 16, 2018

Experts warn of blockchain security risks in non-cryptocurrency use cases.

dummy-img

Hardware, software options emerge for runtime encryption

Jun 20, 2018

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

dummy-img

Cloud functions present new security challenges

Jun 4, 2018

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

dummy-img

How privacy is moving data security to the top of corporate agendas

May 16, 2018

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

dummy-img

Why securing containers and microservices is a challenge

May 3, 2018

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

dummy-img

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Apr 10, 2018

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

dummy-img

How to detect and prevent crypto mining malware

Apr 4, 2018

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great…

dummy-img

Open source software security challenges persist

Apr 2, 2018

Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…

dummy-img

SEC’s new cybersecurity guidance falls short

Mar 5, 2018

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will…

dummy-img

The global cyber war is heating up: Why businesses should be worried

Feb 22, 2018

From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how…

dummy-img

New cryptocurrencies offer better anonymity, new security challenges

Feb 1, 2018

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

dummy-img

Cloud security configuration errors put data at risk; new tools can help

Jan 29, 2018

For companies that run entirely in the cloud, the entire business can be at risk. That has some looking for help with monitoring and verifying…

dummy-img

Open source software security challenges persist, but the risk can be managed

Jan 10, 2018

Using open source components saves developers time and companies money. In other words, it’s here to stay. Here’s a look at what it will take…

dummy-img

Password managers grow up, target business users

Jan 4, 2018

Password managers began as free or low-cost apps for consumers, tracking passwords and sign-ins to websites and applications, making it possible for users to create…

dummy-img

What is a botnet? And why they aren’t going away anytime soon

Dec 6, 2017

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

dummy-img

How hackers crack passwords and why you can’t stop them

Nov 14, 2017

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

dummy-img

What is the cyber kill chain? Why it’s not always the right approach to cyber attacks

Nov 7, 2017

As an infosec professional, you’ve likely heard about using a cyber kill chain, also known as a cyber attack lifecycle, to help identify and prevent…

dummy-img

How AI can help you stay ahead of cybersecurity threats

Oct 19, 2017

Since the 2013 Target breach, it’s been clear that companies need to respond better to security alerts even as volumes have gone up. With this…

dummy-img

Unlimited DDoS protection the new norm after Cloudflare announcement

Oct 16, 2017

Late last month, global distributed denial of service (DDoS) protection provider Cloudflare announced that it would no longer charge customers extra when they were under…

dummy-img

Shadow cloud apps pose unseen risks

Oct 10, 2017

It happens in every company. Employees find a cool new online service that makes them more productive. They create free or low-cost accounts on devices…

dummy-img

The best enterprise antivirus: Kaspersky leads in latest tests

Oct 3, 2017

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, anti-virus tools still play an important role in the…

dummy-img

What is a fileless attack? How hackers invade systems without installing software

Sep 21, 2017

“We see it every day,” says Steven Lentz, CSO at Samsung Research America. “Something coming through, some exploit type, unknown ransomware. We’ve stopped several things…

dummy-img

Is universal end-to-end encrypted email possible (or even desirable)?

Sep 18, 2017

People expect their email to be private between them and the recipient, but in reality, the contents of your email are exposed during transmission. Full…

dummy-img

What’s new in ransomware?

Aug 29, 2017

In June, South Korean hosting company Internet Nayana, Inc., was  hit by a ransomware attack  that took down its 153 Linux web servers — home…

dummy-img

Look beyond job boards to fill cybersecurity jobs

Jul 13, 2017

The cybersecurity talent shortage keeps getting worse. According to Cybersecurity Ventures, the cost of cybercrime will double from $3 trillion globally in 2015 to $6…

dummy-img

Is your data being sold on the dark web?

Jul 12, 2017

Sonatype’s crown jewel is its database of descriptions of over 1.2 million open source packages. “If that is lost, it could be an existential outcome,”…

dummy-img

Two years after the OPM data breach: What government agencies must do now

Jun 20, 2017

The Office of Personnel Management breach in June 2015 was a big wake up call to our federal government, and, in its wake, a number…

dummy-img

With new dynamic capabilities, will whitelisting finally catch on?

Jun 19, 2017

Everybody knows and hates whitelisting. Employees are only allowed to install approved software on their desktops and laptops, so they’re always complaining and asking for…

dummy-img

Few firms will be ready for new European breach disclosure rules, fines

May 24, 2017

The new European General Data Protection Regulation goes into effect next May, but a year might not be enough for firms to get ready

dummy-img

APT3 hackers linked to Chinese intelligence

May 24, 2017

The APT3 hacker group has been linked to the Chinese Ministry of State Security