Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
csonline
Page 8
csonline
csonline
BrandPost: How to Choose Security Technology That Works
BrandPost: How to Choose Security Technology That Works The role of a security practitioner is difficult....
csonline
MTTR “not a viable metric” for complex software system reliability and security
MTTR “not a viable metric” for complex software system reliability and security Mean time to resolve...
csonline
How acceptable is your acceptable use policy?
How acceptable is your acceptable use policy? In a world before smartphones, social media, and hybrid...
csonline
New Royal ransomware group evades detection with partial encryption
New Royal ransomware group evades detection with partial encryption A new ransomware group dubbed Royal that...
csonline
Wiz debuts PEACH tenant isolation framework for cloud applications
Wiz debuts PEACH tenant isolation framework for cloud applications Cloud security vendor Wiz has announced PEACH,...
csonline
Lacework adds new capabilities to its CSPM solution
Lacework adds new capabilities to its CSPM solution Lacework on Wednesday released new cloud security posture...
csonline
Cuba ransomware group used Microsoft developer accounts to sign malicious drivers
Cuba ransomware group used Microsoft developer accounts to sign malicious drivers Microsoft suspended several accounts on...
csonline
Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it
Microsoft Exchange ProxyNotShell vulnerability explained and how to mitigate it Last year, two high severity, easily...
csonline
Microsoft’s EU data boundary plan to take effect Jan. 1
Microsoft’s EU data boundary plan to take effect Jan. 1 The plan, which covers Microsoft products...
csonline
Are robots too insecure for lethal use by law enforcement?
Are robots too insecure for lethal use by law enforcement? In late November, the San Francisco...
csonline
PCI Secure Software Standard version 1.2 sets out new payment security requirements
PCI Secure Software Standard version 1.2 sets out new payment security requirements The Payment Card Industry...
csonline
European Commission takes step toward approving EU-US data privacy pact
European Commission takes step toward approving EU-US data privacy pact The EU-US Data Privacy Framework—drafted to...
csonline
Palo Alto Networks flags top cyberthreats, offers new zero-day protections
Palo Alto Networks flags top cyberthreats, offers new zero-day protections Firewall and security software vendor Palo...
csonline
BrandPost: Securing Operational Technology Environments for Critical Infrastructure
BrandPost: Securing Operational Technology Environments for Critical Infrastructure Juniper Networks is applying its industry leading AI-driven...
csonline
US Congress rolls back proposal to restrict use of Chinese chips
US Congress rolls back proposal to restrict use of Chinese chips After business groups argued that...
csonline
Apple finally adds encryption to iCloud backups
Apple finally adds encryption to iCloud backups Apple has rolled out a number of security features...
csonline
Microsoft’s rough 2022 security year in review
Microsoft’s rough 2022 security year in review We soon close out the security year of 2022....
csonline
JSON-based SQL injection attacks trigger need to update web application firewalls
JSON-based SQL injection attacks trigger need to update web application firewalls Security researchers have developed a...
csonline
Uptycs launches agentless cloud workload scanning
Uptycs launches agentless cloud workload scanning CNAPP (cloud native application protection platform) and XDR (extended detection...
csonline
14 lessons CISOs learned in 2022
14 lessons CISOs learned in 2022 We’re about to finish yet another erratic year, in which...
csonline
What you should know when considering cyber insurance in 2023
What you should know when considering cyber insurance in 2023 As the frequency and severity of...
csonline
The changing role of the MITRE ATT@CK framework
The changing role of the MITRE ATT@CK framework Since its creation in 2013, the MITRE ATT&CK...
csonline
The cybersecurity challenges and opportunities of digital twins
The cybersecurity challenges and opportunities of digital twins Digital twins are a digital representation of objects,...
csonline
Action1 launches threat actor filtering to block remote management platform abuse
Action1 launches threat actor filtering to block remote management platform abuse Action1 has announced new AI-based...
csonline
Flaws in MegaRAC baseband management firmware impact many server brands
Flaws in MegaRAC baseband management firmware impact many server brands Researchers have found three vulnerabilities in...
csonline
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation Ransomware was again the top attack...
csonline
Ransomware attack knocks Rackspace’s Exchange servers offline
Ransomware attack knocks Rackspace’s Exchange servers offline Rackspace’s hosting for Exchange servers remained offline Tuesday after...
csonline
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new report A report released by Meta’s...
csonline
Palo Alto Networks looks to shore up healthcare IoT security
Palo Alto Networks looks to shore up healthcare IoT security Palo Alto Networks today rolled out...
csonline
Cybercriminals are increasingly using info-stealing malware to target victims
Cybercriminals are increasingly using info-stealing malware to target victims Cybercriminals are increasingly shifting from automated scam-as-a-service...
Posts navigation
1
…
7
8
9
…
16
Latest News
Data Breach Today
Lowest-Rung Attackers Challenging Ransomware-as-a-Service – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Why Health Firms Struggle with Cybersecurity Frameworks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Breach Roundup: LabHost Goes Down – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | CybeRx – How to Automatically Protect Rockwell OT Customers from Today’s Cyber-Attacks – Source: www.databreachtoday.com
19/04/2024
Data Breach Today
Live Webinar | Human Detection & Response: Exploring Three Security Awareness Realities – Source: www.databreachtoday.com
19/04/2024