CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

July 26, 2022

How a sex worker became a defense contractor employee -- and an insider threat

An accomplished research scientist manipulated a defense contractor CEO into hiring a prostitute for a technical role. Here's how this insider threat could have been avoided. Read more ▶

Image: 6 security analyst job description red flags that make hiring harder

6 security analyst job description red flags that make hiring harder

With security professionals in short supply, it pays to ensure your job postings aren’t turning away good candidates. Here are six things experts say to avoid and what to do instead.

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed.

8 top SBOM tools to consider

These commercial and open-source tools will scan code and create software bills of materials automatically.

Image: 9 tips to prevent phishing

9 tips to prevent phishing

From rewarding employees for savvy security smarts, to showing them how breaches are relevant to their every-day duties, we've got the phishing prevention tips you need.

Auth0’s OpenFGA explained: Open source universal authorization

Authorization is an essential and non-trivial need in application development. Modern requirements have only increased the complexity of delivering adequate authorization. Auth0 aims to make authorization more standard and streamlined with Open FGA.

10 industry-defining security incidents from the last decade

From Heartbleed to Apache Struts to SolarWinds, these are the 10 watershed security incidents of the past 10 years.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494