Latest articles for CSO magazine

dummy-img

EMV migration delay doesn’t let gas stations completely off the hook

Dec 8, 2016

Last week, Visa, MasterCard and American Expressed delayed the EMV migration deadline for gas stations from October 2017 to October 2020 — but that doesn’t…

dummy-img

Obama’s cybersecurity recommendations a small step forward, but need teeth and political willpower

Dec 7, 2016

Last week’s report by the nonpartisan Commission on Enhancing National Cybersecurity recommended training 100,000 new cybersecurity professionals and increasing federal R&D funding for cybersecurity by…

dummy-img

Security pros most worried about clouds, mobile

Dec 5, 2016

Companies were least prepared to assess the security risks of cloud and mobile technologies, according to a survey of cybersecurity professionals released this morning.Around 60…

dummy-img

AI is coming, and will take some jobs, but no need to worry

Dec 2, 2016

The capabilities of artificial intelligence and machine learning are accelerating, and many cybersecurity tasks currently performed by humans will be automated. There will still be…

dummy-img

Scholars, infosec experts call for action on Russian hacking

Dec 1, 2016

In the wake of reports about Russian involvement in fake news and hacks against political targets leading up to the recent presidential election, scholars and…

dummy-img

Report: Only 6% of businesses use DMARC email authentication, and only 1.5% enforce it

Dec 1, 2016

In a study of 1 million corporate domains, only 60,000 had made any attempt at DMARC email authentication, and of those, only a quarter actually…

dummy-img

SIEMs-as-a-service addresses needs of small, midsize enterprises

Nov 30, 2016

The city of Lewiston, in north central Idaho, has a population of around 32,000 and an information systems budget of around $800,000 a year.But it…

dummy-img

Report: Most cybercriminals earn $1,000 to $3,000 a month

Nov 30, 2016

Most cybercriminals make between $1,000 and $3,000 a month, but 20 percent earn $20,000 a month or more, according to a recent report.The data is…

dummy-img

Ransomware victims able to thwart attacks, report says

Nov 18, 2016

The vast majority of companies hit by ransomware attacks were able to stop the attacks by either preventing the malware from getting to their files,…

dummy-img

Battling global DDoS attacks requires coordinated response

Nov 18, 2016

Service providers that run the backbone of the internet need to have a coordinated response to deal with a global distributed denial of service attack,…

dummy-img

Report: Surveillance cameras most dangerous IoT devices in enterprise

Nov 17, 2016

Networked security cameras are the most likely to have vulnerabilities when it comes to securing Internet of Things devices in the enterprise, according to a…

dummy-img

Security experts divided on ethics of Facebook’s password purchases

Nov 16, 2016

Last week, Facebook CSO Alex Stamos told conference attendees in Lisbon that the company buys stolen passwords on the black market, and some security experts…

dummy-img

Visibility, security top concerns for cloud computing adoption

Nov 10, 2016

Enterprises considering adopting public clouds are concerned about where their data is located and how it’s protected, according to a new survey by IDG.Companies will…

dummy-img

AI makes security systems more flexible

Nov 8, 2016

Advances in machine learning are making security systems easier to train and more flexible in dealing with changing conditions, but not all use cases are…

Flood of threat intelligence overwhelming for many firms

Flood of threat intelligence overwhelming for many firms

Nov 3, 2016

Three years after Target missed alerts warning them about a massive data breach, the amount of threat information coming in from security systems is still…

dummy-img

Unencrypted pagers a security risk for hospitals, power plants

Nov 1, 2016

For most of us, pagers went out when cell phones came in, but some companies are still using them and when the messages are sent…

Why don’t developers have a ‘spellchecker’ for security’?

Why don’t developers have a ‘spellchecker’ for security’?

Oct 31, 2016

Despite all the news coverage about successful cyberattacks, developers are still writing code full of security vulnerabilities.Of course, nobody is perfect. We all make mistakes,…

dummy-img

Russian criminals’ bank attacks go global

Oct 26, 2016

Russian cybercriminals have field tested their attack techniques on local banks, and have now begun taking them global, according to a new report — and…

dummy-img

Flash mobs the latest threat this holiday season

Oct 26, 2016

The holiday season rings in more than just higher sales for retailers. There’s also more shoplifting and lower profit margins than the rest of the…

dummy-img

Cybersecurity ‘ninjas’ value challenges, training and flexible schedules over pay

Oct 19, 2016

Challenging work, skills training and flexible work hours are important for all cybersecurity employees, but especially so for the highest skilled workers, according to a…

dummy-img

Researcher unveils second Samsung Pay vulnerability

Oct 19, 2016

Samsung just can’t catch a break these days. Its phones are exploding, and so are its washing machines, and now a security researcher has found…

dummy-img

Yahoo shows that breach impacts can go far beyond remediation expenses

Oct 13, 2016

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies…

dummy-img

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Oct 12, 2016

Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker’s Playbook, based on…

dummy-img

Leaky IoT devices help hackers attack e-commerce sites

Oct 12, 2016

Millions of IoT devices are misconfigured so that they can forward messages — which, combined with default admin settings, allows them to be used to…

dummy-img

How Shodan helped bring down a ransomware botnet

Oct 7, 2016

Shodan is a search engine that looks for internet-connected devices. Hackers use it to find unsecured ports and companies use it to make sure that…

dummy-img

Data leaks evolving into weapons of business destruction

Oct 3, 2016

Most of the recent data breaches involve customer information such as user names and passwords, credit card numbers, and medical histories. The companies hacked are…

dummy-img

Diversified supply chain helps ‘Vendetta Brothers’ succeed in criminal business

Sep 29, 2016

Even smaller criminal groups are using smart business tactics to help insulate them from risk, such as the Vendetta World online shop, which sells credit…

dummy-img

73% of companies using vulnerable end-of-life networking devices

Sep 28, 2016

Seventy-three percent of companies are using vulnerable, end-of-life networking equipment, up from 60 percent last year, according to a new analysis of more than 212,000…

dummy-img

NY regulation aims to raise bank security standards

Sep 23, 2016

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation — and, so far, security experts…

dummy-img

As migration anniversary approaches, only a third of retailers accept chip cards

Sep 22, 2016

Retailers were supposed to start accepting chip cards last October, but a year past the start of the EMV liability shift, two-thirds still haven’t done…