CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

April 16, 2022

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings. Read more ▶

Image: Sponsored by Microsoft Security: How CISOs Can Manage the Intersection of Security, Privacy & Trust

BrandPost Sponsored by Microsoft Security

Sponsored by Microsoft Security: How CISOs Can Manage the Intersection of Security, Privacy & Trust

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.

Tracking incident alerts: Is 24 trillion a large number?

Large enterprises might monitor millions or even billions of security signals a day. At that scale, you need to set expectations about detection failures.

Image: Who is your biggest insider threat?

Who is your biggest insider threat?

Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.

It's time to re-evaluate your 2FA setup on Microsoft networks

Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?

Meta, Apple emergency data request scam holds lessons for CISOs

Fake requests from law enforcement gave cybercriminals access to sensitive customer data. It's a signal for CISOs to work with business to review and update processes for these requests.

The security user experience (SUX)

Security processes that treat the very users we protect as unwanted burdens and alienate them in the process are a path to failure.

CSO
Facebook Twitter LinkedIn
© 2022 CSO
140 Kendrick Street, Building B
Needham, MA 02494