Personal liability sours 70% of CISOs on their role
With legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be […]
12 cybersecurity resolutions for 2025
As cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From […]
Critical Windows LDAP flaw could lead to crashed servers, RCE attacks
Researchers have published a proof-of-concept exploit for a pair of Windows Lightweight Directory Access Protocol (LDAP) […]
US government sanctions Chinese cybersecurity company linked to APT group
The US Department of Treasury’s Office of Foreign Assets Control (OFAC) has issued sanctions against a […]
Secure by design vs by default – which software development concept is better?
As cybersecurity professionals, we need to know that the software products we acquire are safe and […]
Volkswagen massive data leak caused by a failure to secure AWS credentials
A failure to properly protect access to its AWS environment is one of the root causes […]
Microsoft Sentinel: A cloud-native SIEM with integrated GenAI
In a recent survey, 74% of cybersecurity professionals said that the threat landscape is the worst […]
US soldier linked to Trump call log hack arrested in Texas
Court documents unsealed Monday show that US authorities have arrested a 20-year-old soldier, Cameron John Wagenius, […]
Download our security orchestration, automation, and remediation (SOAR) tools buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what SOAR […]
Download the Hot IT Certifications Enterprise Spotlight
Download the January 2025 issue of the Enterprise Spotlight from the editors of CIO, Computerworld, CSO, […]