In the written testimony before the House Energy and Commerce Committee, CEO Andrew Witty said after gaining access, the ...
There’s usually a strict protocol for granting access to systems or data to a new employee or contractor. But there are ...
A string of recent false or misleading cyber breach reports, fueled by rampant online dissemination, is fostering an ...
A characteristic that gives any flaw longevity among attackers is how difficult it is to patch. In Log4j’s case, this was ...
Marriot revealed in a court case around a massive 2018 data breach that it had been using secure hash algorithm 1 and not the ...
For all the flexibility and cost management upsides to hybrid/multicloud infrastructure, there is a major trade-off: ...
Automation can enhance an AI red teamer’s existing domain expertise while offloading tedious tasks. Learn more today.
A new law expanding the Investigatory Powers Act, the UK’s already-controversial surveillance and data access rules, became ...
CSO ASEAN is proud to launch the fourth edition of the CSO30 ASEAN Awards in 2024 – recognising the top 30 cybersecurity ...
Sometimes it's not really clear why a company wants to hire a CISO or the role lacks authority. There are some key questions ...
Frustration, stress, and increased liability are only a few of the off-putting realities giving CISOs cold feet. It doesn’t ...
Hackers exploited previously undetected vulnerabilities in Cisco’s Adaptive Security Appliances — a product that combines ...