Zero trust, not no trust: A practical guide to implementing ZTNA
Zero-trust network access (ZTNA) is a security model that follows the principle of “never trust, always […]
Accenture forges own path to improve attack surface management
Accenture’s award-winning attack surface management program strengthens the company’s resiliency and security posture. As a global […]
The critical importance of choosing the right data center firewall
Data centers are the backbone of modern IT architecture. However, as organizations increasingly rely on cloud […]
Thousands of internet-exposed fuel gauges could be hacked and dangerously exploited
Thousands of automatic tank gauge (ATG) systems used in gas stations, power plants, airports, military bases, […]
CrowdStrike outage redefines EDR market emphasis
July’s infamous CrowdStrike outage has shaken up the endpoint detection and response (EDR) marketplace by placing […]
When technical debt strikes the security stack
Most veteran CISOs implicitly understand the concept of technical debt and how it increases the risk […]
CrowdStrike defends access to Windows kernel at US Congressional hearing into July worldwide update failure
A CrowdStrike executive told a US Congressional hearing on Tuesday that the company’s endpoint detection and […]
Sweden accuses Iran of SMS revenge hack
The Swedish Prosecutor’s Office has announced that a preliminary investigation carried out with the Swedish Security […]
Download our AI security posture management (AI-SPM) enterprise buyer’s guide
From the editors of CSO, this enterprise buyer’s guide helps IT security staff understand what the […]
US to ban connected vehicle tech from China, Russia due to national security risks
The Biden administration is looking to ban the import of connected vehicles and associated technologies from […]