Latest articles for CSO magazine

dummy-img

Concerns about security, information sharing up among industrial control system security pros

Jun 22, 2016

Security managers working with industrial control systems are increasingly concerned about security, and worried about insufficient information sharing in the industry, according to a new…

dummy-img

Spearphishing attacks target boards

Jun 20, 2016

With great power comes great responsibility — and also a great big target painted on your head. At least, that’s the case lately with corporate…

dummy-img

Boards ready to fire over bad security reporting

Jun 14, 2016

If CISOs don’t do a good job of communicating, 59 percent of board members said that the security executives stand to lose their jobs, according…

dummy-img

Study: Most companies can’t protect confidential documents

Jun 13, 2016

A majority of companies don’t have the technology in place to keep employees from sharing confidential documents, according to a study released today. In particular,…

dummy-img

US phone users least likely to switch after security breach

Jun 8, 2016

Globally, 47 percent of consumers would switch their mobile phone carrier in the event of a security breach, up 7 percent from last year, but…

dummy-img

Shaming is a step forward, but more work is needed for faster smartphone patching

Jun 7, 2016

Shaming carriers and smartphone manufacturers into applying patches faster is a step forward, but a lot more needs to be done to improve security of…

dummy-img

Surescripts opts for easier, faster UBA deployment

Jun 1, 2016

Surescripts is not a data science company. But as the largest health information network in the country, they’ve gotten good at handling Big Data. And…

dummy-img

93% of phishing emails are now ransomware

Jun 1, 2016

As of the end of March, 93 percent of all phishing emails contained encryption ransomware, according to a report released today by PhishMe. That was…

dummy-img

Laptop updaters riddled with security holes

May 31, 2016

A recent test of pre-installed updater software on 10 laptops showed that every single one had security problems.”We went and bought about 10 laptops,” said…

dummy-img

Will your backups protect you against ransomware?

May 31, 2016

In theory, nobody should be paying any money to the ransomware extortionists. Doesn’t everyone have backups these days? Even consumer has access to a wide…

dummy-img

Second-factor may prevent ATM fraud

May 27, 2016

Crooks stole $12.7 million at 1,400 Japanese ATMs earlier this month, with around 100 people making 14,000 transactions with 1,600 counterfeit credit cards based on…

dummy-img

Regulators: cybersecurity poses biggest risk to global financial system

May 25, 2016

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry. “Cyber risks can produce far-reaching…

dummy-img

60% of enterprise phones still vulnerable to QSEE exploit

May 19, 2016

Most enterprise users with Android phones are still vulnerable to an exploit that allows attackers to get into their phone’s Qualcomm Secure Executive Environment and…

dummy-img

Cybercriminal business model vulnerable to intervention

May 17, 2016

Cybercrime may be booming but its business model is vulnerable on many fronts, according to a new report.”We’ve been observing that they’ve been acting like…

dummy-img

Terrorists opt for consumer tools

May 13, 2016

Although cybercriminals have been turning out specialized hacking and attack tools at a rapid pace, terrorists are often using legitimate, consumer-focused technologies, according to a…

dummy-img

Criminals taking a bigger bite of health breaches

May 12, 2016

The percentage of health care data breaches due to criminals has risen from 20 to 50 percent since 2010, but health care organizations are failing…

dummy-img

Retailers must upgrade authentication, encryption and pen testing

May 6, 2016

The PCI Security Standards Council now requires better authentication, encryption and penetration testing by companies that accept consumer payments, improvements lauded by security experts.”There are…

dummy-img

10 companies that can help you fight phishing

May 5, 2016

According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack. That’s because it works well,…

dummy-img

DDoS costs, damages on the rise

May 5, 2016

Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…

dummy-img

DDoS costs, damages on the rise

May 5, 2016

Peak-time distributed denial-of-service attacks cost organizations more than $100,000 per hour, said half of the respondents to a new survey of mid-sized and large corporations…

dummy-img

Security pros concerned about Facebook payment expansion

Apr 29, 2016

Facebook’s Messenger app has allowed users to send money to friends using their debit cards since last spring, but recent reports indicate that Facebook may…

dummy-img

Enterprises fall behind on protecting against phishing, detecting breaches

Apr 26, 2016

The ninth annual Verizon Data Breach Report came out this morning with bad news on multiple fronts, including click-through rates on phishing messages, how long…

dummy-img

Phishing emails leverage unique subject lines, Office docs

Apr 26, 2016

Phishing emails continued to evolve last year, according to a new report from PhishMe, with Microsoft Office documents and unique subject lines used to get…

dummy-img

CEO targeted by fraud twice a month

Apr 19, 2016

Every couple of weeks or so, Tom Kemp’s company gets hit by ever-more-sophisticated attempts to trick them out of large sums of money. It started…

dummy-img

New sensors help reduce supply chain risks

Apr 13, 2016

Better sensors help companies reduce shipping risks and react faster to disruptions, but costs and deployment challenges are still slowing adoption.According to a Capgemini Consulting…

dummy-img

Survey: Health care industry most targeted by cyberattackers

Apr 13, 2016

According to a survey released this morning by 451 Research, 63 percent of health care industry respondents said they had experienced a breach, the highest…

dummy-img

Only a third of companies know how many vendors access their systems

Apr 12, 2016

The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…

dummy-img

Only a third of companies know how many vendors access their systems

Apr 12, 2016

The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…

dummy-img

Only a third of companies know how many vendors access their systems

Apr 12, 2016

The average company’s network is accessed by 89 different vendors every week, according to a new research report that surveyed more than 600 IT decision…

dummy-img

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Apr 12, 2016

Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…