Sometimes it's not really clear why a company wants to hire a CISO or the role lacks authority. There are some key questions ...
CSO ASEAN is proud to launch the fourth edition of the CSO30 ASEAN Awards in 2024 – recognising the top 30 cybersecurity ...
Frustration, stress, and increased liability are only a few of the off-putting realities giving CISOs cold feet. It doesn’t ...
Direct visibility is critical in M&A, and cloud-native application protection platforms (CNAPP) are ideal to provide this ...
The ToddyCat attackers were also observed setting up virtual private network (VPN) servers on compromised systems by using ...
Analyzing incidents in the past will help advise a stronger cybersecurity strategy in the future—2024 and beyond.
Hackers exploited previously undetected vulnerabilities in Cisco’s Adaptive Security Appliances — a product that combines ...
Critical Start’s new offering is designed to handle security teams with specialized detection and response tooling for ...
What should happen in the wake of the CSRB’s Microsoft report? This former security industry analyst has some suggestions.
A now-patched Windows Print Spooler flaw was used by Forest Blizzard to drop the privilege-elevating malware for credential ...
Put simply, a security program run from a single source of truth is possible when your security program makes business ...
Assumed Breach is the third but often overlooked principle of zero trust. When we talk about adopting a “not if, but when” ...