CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

May 11, 2022

7 top software supply chain security tools

These tools will help identify vulnerabilities and threats posed by third-party code through software composition analysis and SBOM creation. Read more ▶

Image: Sponsored by ExtraHop: New Gartner Report, Quick Answer: Ransomware — What Happens If You Pay?

BrandPost Sponsored by ExtraHop

Sponsored by ExtraHop: New Gartner Report, Quick Answer: Ransomware — What Happens If You Pay?

There's one surefire way to end ransomware once and for all: Stop paying. If every organization that suffered a ransomware attack refused to pay up, the threats would lose their income stream, and the work would dry up leading to the end of these attacks as we know them.

Microsoft expands managed security services offerings with new program

Security Experts allows customers to tap into Microsoft pros for threat hunting, XDR, and modernization.

NIST Cybersecurity Framework update comments highlight a gamut of needed changes

Better metrics, implementation guidance, and alignment with other frameworks are high on the list of suggested improvements to the NIST CSF.

Image: What your cyber insurance application form can tell you about ransomware readiness

What your cyber insurance application form can tell you about ransomware readiness

The annual cyber insurance application form shows what the carriers think you should be doing to best prevent and recover from ransomware attacks. Pay attention.

CREST partners with Immersive Labs, Hack The Box to enhance cybersecurity skills development

Cybersecurity accreditation and certification body announces two new skills development-focused partnerships as cybersecurity skills challenges continue to impact organizations.

HackerOne launches Attack Resistance Management solution to boost cyber resilience

Vulnerability coordination and bug bounty platform says its new solution addresses attack resistance gaps by blending the security expertise of ethical hackers with asset discovery, continuous assessment, and process enhancement.

Zero-click attacks explained, and why they are so dangerous

Zero-click attacks, especially when combined with zero-day vulnerabilities, are difficult to detect and becoming more common.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494