Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions
The CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.
Steven Bay, a former defense contractor, knows a thing or two about insider threats. For a brief period, he was the boss of Edward Snowden, the famous leaker who stole sensitive files from the National Security Agency.
Most everyone knows that as cloud adoption increases, the maturity of cloud security must also increase. But, before investing in the latest and greatest tools, we always recommend that CISOs start by defining what outcomes are
Developers of the popular LastPass password manager rushed to push out a fix to solve a serious vulnerability that could have allowed attackers to steal users' passwords or execute malicious code on their computers.
Many organizations are facing a reality where their security investments have been focused on-prem but their users, devices, or apps are moving off-prem. A common question we hear from CISOs is: "How do we determine when it's time to
U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.
In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding...
Gain actionable insights on how to defend your websites and APIs for the coming year's onslaught of automated threats. Join the conversation with EMA and Distil Networks as they dive into the latest Distil Networks Bad Bot Report data
Organizations that use the popular Moodle learning management system should deploy the latest patches as soon as possible because they fix vulnerabilities that could allow attackers to take over web servers.
A vulnerability in Cisco’s widely deployed IOS software that was disclosed in the recent WikiLeaks dump of CIA exploits has triggered the company to release a critical warning for its Catalyst networking customers.
The U.S. Department of Homeland Security has ordered that passengers on flights departing for the U.S from 10 airports in the Middle East and Africa will have to carry personal electronics larger than a smartphone as checked baggage,...