Latest articles for CSO magazine

dummy-img

Symantec: Zero-days doubled in 2015, more companies hiding breach data

Apr 12, 2016

Fifty-four zero-day vulnerabilities were discovered last year, according to a report released this morning by Symantec, more than double that of 2014, and the number…

dummy-img

Millions of child support records stolen, D.C. officials want answers

Apr 8, 2016

In early February, a thief broke into several offices in Olympia, Washington to steal anything he could grab that was worth selling. In one locked…

dummy-img

Is the blockchain good for security?

Apr 1, 2016

Overstock was one of the first online retailers to adopt Bitcoin in a big way. Now it’s become the first major company to issue stock…

dummy-img

Feds tackle open source code quality

Mar 31, 2016

Even as the White House is calling on federal agencies to make more use of open source projects, there’s also a federal effort under way…

dummy-img

Merging firms appealing targets for attackers

Mar 30, 2016

Companies going through a merger or acquisition, as well as their lawyers, financial advisers, and other associated firms are all tempting targets for cyberattackers, according…

dummy-img

Public concerned about security flaws in government open source code

Mar 24, 2016

Earlier this month, the White House released a draft of an open source code policy for public review which would require agencies to share code…

dummy-img

Report: Federal agencies still fighting the last war

Mar 24, 2016

Federal government agencies are still fighting the last cybersecurity war, the one where computer networks had a strong, defensible perimeter, according to a new report…

dummy-img

FBI, Apple battle may leave lasting legacy

Mar 23, 2016

The FBI may have backed off from its demand that Apple build a backdoor to an iPhone security mechanism, for now at least, but experts…

dummy-img

27% of US office workers would sell their passwords

Mar 21, 2016

In a survey released today, 27 percent of of U.S. office workers at large companies would sell their work password to an outsider, compared to…

dummy-img

Sentry MBA makes credential stuffing attacks easy and cheap

Mar 17, 2016

A new report released by Shape Security yesterday details how the Sentry MBA tool makes credential stuffing attacks more widely available to cybercriminals.The traditional “brute…

dummy-img

Business email compromise fraud rising fast, hard to fight

Mar 16, 2016

The email comes from a trusted source — the CEO, a regular vendor, the company attorney or accountant. It’s part of an ongoing conversation, the…

dummy-img

FTC orders nine PCI auditors to share assessment details

Mar 10, 2016

The FTC is on a data breach enforcement roll. Last summer, the courts allowed it to fine companies with weak cybersecurity practices. Now, the FTC…

dummy-img

Cybersecurity no longer merger afterthought

Mar 3, 2016

As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped.”When you look…

dummy-img

Next-generation endpoint security tools ready to replace antivirus

Mar 2, 2016

The market for next-generation endpoint security tools has doubled each of the last two years, and will continue to grow at a compound annual growth…

dummy-img

Report: Web gateways fail to stop malicious outbound communications

Mar 2, 2016

In a recent study of a million client devices over the course of 10 months in 2015, every web gateway allowed outbound malicious communications –…

dummy-img

Cybercriminals face hacker talent shortage

Mar 1, 2016

Cybercriminals and hacktivists face many of the same hiring problems as defending security organizations, but with their own particular twists, according to report released this…

dummy-img

Firms expect greater government cybersecurity oversight

Mar 1, 2016

The U.S. Senate recently proposed a cybersecurity disclosure bill that would require public companies to describe what cybersecurity expertise their boards have, or, if they…

dummy-img

Verizon releases first-ever data breach digest with security case studies

Mar 1, 2016

Verizon is known for its huge annual Data Breach Investigations Report, but this morning it released a less data-heavy digest organized by case study. The…

dummy-img

Report: Compliance biggest driver of encryption

Feb 29, 2016

The biggest driver of encryption technology is the need to comply with privacy or data security regulations, according to a new report.In a survey of…

dummy-img

Firms detect breaches sooner, but attackers have gotten nastier

Feb 25, 2016

Firms are detecting breaches nearly 30 percent sooner than before, according to a new report from Mandiant, but attackers are also getting more aggressive in…

dummy-img

VTech not backing down on terms change after data breach

Feb 19, 2016

Despite widespread public condemnation, Hong Kong toy maker VTech is not backing down from a change in its Terms and Conditions ducking its responsibilities in…

dummy-img

Report: Breaches responsible for increasing amount of collateral damage

Feb 17, 2016

2015 was the “Year of Collateral Damage,” according to a report released this morning by Hewlett Packard Enterprise.Attackers targeting companies or other organizations are not…

dummy-img

Study finds that anti-crypto laws won’t work on an international stage

Feb 11, 2016

In response to attempts to put restrictions on encryption technology, a new report surveys 546 encryption products in 54 countries outside the United States, out…

dummy-img

IBM’s X-Force team hacks into smart building

Feb 10, 2016

As buildings get smarter and increasingly connected to the Internet, they become a potential vector for attackers to target.IBM’s X-Force ethical hacking team recently ran…

dummy-img

China’s next five-year plan offers preview of cybersecurity targets

Feb 3, 2016

Is your industry next in line to be targeted by China’s government-sponsored hackers? To find out, look at China’s latest five-year plan, suggests a global…

dummy-img

Survey: Average successful hack nets less than $15,000

Feb 2, 2016

The majority of cyber attackers are motivated by money, but make less than $15,000 per successful attack, according to a survey of hackers in the…

dummy-img

27% of all malware variants in history were created in 2015

Jan 29, 2016

Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected…

dummy-img

Cybersecurity pros switch jobs for challenging work, pay, and flexible hours

Jan 27, 2016

Cybersecurity pros are most likely to leave to find more challenging work, better pay, and more flexible working hours, according to a survey released this…

dummy-img

Over 113 million health records breached in 2015 — up 10-fold from 2014

Jan 27, 2016

One out of every three Americans was affected by a healthcare record breach last year, or more than 113 million people, up more than 10-fold…

dummy-img

Preparation lowers long-term post-breach costs

Jan 26, 2016

Preparation can significantly lower the long-term costs of a breach, according to a SANS report released this morning. Companies that had plans in place, that…