In the written testimony before the House Energy and Commerce Committee, CEO Andrew Witty said after gaining access, the ...
There’s usually a strict protocol for granting access to systems or data to a new employee or contractor. But there are ...
A string of recent false or misleading cyber breach reports, fueled by rampant online dissemination, is fostering an ...
A characteristic that gives any flaw longevity among attackers is how difficult it is to patch. In Log4j’s case, this was ...
Marriot revealed in a court case around a massive 2018 data breach that it had been using secure hash algorithm 1 and not the ...
A new law expanding the Investigatory Powers Act, the UK’s already-controversial surveillance and data access rules, became ...
For all the flexibility and cost management upsides to hybrid/multicloud infrastructure, there is a major trade-off: ...
Automation can enhance an AI red teamer’s existing domain expertise while offloading tedious tasks. Learn more today.
CSO ASEAN is proud to launch the fourth edition of the CSO30 ASEAN Awards in 2024 – recognising the top 30 cybersecurity ...
Sometimes it's not really clear why a company wants to hire a CISO or the role lacks authority. There are some key questions ...
Frustration, stress, and increased liability are only a few of the off-putting realities giving CISOs cold feet. It doesn’t ...
Hackers exploited previously undetected vulnerabilities in Cisco’s Adaptive Security Appliances — a product that combines ...