CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

May 06, 2022

9 top identity and access management tools

Identity is becoming the new perimeter, and these IAM tools have evolved to help secure assets as organizations rely less on traditional perimeter defenses and move to zero-trust environments. Read more ▶

Image: Sponsored by Akamai: How to Best Protect Multi-cloud and Hybrid Environments

Sponsored by Akamai: How to Best Protect Multi-cloud and Hybrid Environments

Take security into your own hands to protect applications, workloads and data across complex IT environments.

Chinese APT group Mustang Panda targets European and Russian organizations

Latest campaigns by Mustang Panda highlight the threat actor's versatility in terms of the tools and techniques it is able to use.

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

Image: Musk’s Twitterverse and the future of misinformation

Musk’s Twitterverse and the future of misinformation

Security influencers weigh in with both concerns and curiosity over the future of the social network.

9 most important steps for SMBs to defend against ransomware attacks

Here's how small- to medium-sized businesses can effectively protect their networks against the risk of ransomware without breaking their security budgets.

The new cybersecurity mandate

Parsing the White House’s cybersecurity directives.

Cybersecurity metrics corporate boards want to see

These are the metrics that boards of directors will find useful because they help map security investments with strategic goals and risks.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494