CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 28, 2022

Best practices for recovering a Microsoft network after an incident

Follow this advice to minimize stress when recovering credentials, systems and settings after a ransomware or other cyberattack. Read more ▶

Image: Defense in depth explained: Layering tools and processes for better security

Defense in depth explained: Layering tools and processes for better security

Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold.

9 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

8 top SBOM tools to consider

These commercial and open-source tools will scan code and create software bills of materials automatically.

Image: What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

How a sex worker became a defense contractor employee -- and an insider threat

An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided.

5 trends making cybersecurity threats riskier and more expensive

Risks increase as the world becomes more digital, regulated, and interconnected, but you can take steps to reduce their impact.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494