Secure by design vs by default – which software development concept is better?
As cybersecurity professionals, we need to know that the software products we acquire are safe and […]
Volkswagen massive data leak caused by a failure to secure AWS credentials
A failure to properly protect access to its AWS environment is one of the root causes […]
Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
In a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst […]
US soldier linked to Trump call log hack arrested in Texas
Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, […]
Download our security orchestration, automation, and remediation (SOAR) tools buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR […]
Download our security orchestration, automation, and remediation (SOAR) tools buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR […]
Download the Hot IT Certifications Enterprise Spotlight
Download the January 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]
12 best entry-level cybersecurity certifications
A UC Berkeley professor recently made headlines when he stated that even his computer science graduates […]
SquareX Researchers Expose OAuth Attack on Chrome Extensions Days Before Major Breach
SquareX, an industry-first Browser Detection and Response (BDR) solution, leads the way in browser security. About […]
CISO – Traumjob oder eher Albtraum
loading=”lazy” width=”400px”>Der CISO-Job kann auch zu einem Albtraum werden – gerade wenn die Unterstützung und das […]