LaptrinhX
  • My
  • News
  • Tiktok
  • Tag
  • Author
  • Ebook
  • Theme
  • Tutorial
  • Funny
  • IT Job
  • Video
  • Tools
  • Hacker News
  • India (বাংলা)
  • Česká republika (čeština)
  • Danmark (Dansk)
  • Österreich (Deutsch)
  • Schweiz (Deutsch)
  • Deutschland (Deutsch)
  • Ελλάδα (ελληνικά)
  • United Arab Emirates (English)
  • Australia (English)
  • Canada (English)
  • United Kingdom (English)
  • Ireland (English)
  • India (English)
  • Malaysia (English)
  • New Zealand (English)
  • Philippines (English)
  • Singapore (English)
  • United States (English)
  • International Edition (English)
  • South Africa (English)
  • Argentina (español)
  • Chile (español)
  • Colombia (español)
  • España (español)
  • México (español)
  • Perú (español)
  • United States (español)
  • Venezuela (español)
  • América Latina (español)
  • Suomi (suomi)
  • Belgique (français)
  • Canada (français)
  • Suisse (français)
  • France (français)
  • Afrique francophone (français)
  • India (हिंदी)
  • Magyarország (magyar)
  • Indonesia (Bahasa Indonesia)
  • Italia (italiano)
  • 日本 (日本語)
  • 한국 (한국어)
  • India (मराठी)
  • Norge (norsk, bokmål)
  • België (Nederlands)
  • Nederland (Nederlands)
  • Polska (polski)
  • Brasil (português)
  • Portugal (Português)
  • Россия (Pусский)
  • Sverige (svenska)
  • India (తెలుగు)
  • ไทย (ไทย)
  • Türkiye (Türkçe)
  • Việt Nam (Tiếng Việt)
  • 中华人民共和国 (简体中文)
  • 香港特别行政區 (繁體中文)
  • 台灣 (繁體中文)

    Tags ::

    csoonline.com csoonline.com

    A collection of 13,433 posts


    csoonline.com csoonline.com 2021-04-27 20:06

    NCSC warns UK organisations of FluBot SMS spyware scam

    The UK’s National Cyber Security Centre (NCSC) and leading mobile networks...

    Michael Hill
    M Michael Hill
    2 min read
    csoonline.com csoonline.com 2021-04-27 14:00

    15 open source GitHub projects for security pros

    Whether you are a sysadmin, a threat intel analyst, a malware researcher, forensics expert, or even a software developer looking to build...

    Ax Sharma
    A Ax Sharma
    5 min read
    csoonline.com csoonline.com 2021-04-27 01:42

    Upstox shows MobiKwik how to manage a data breach incident

    Indian trading platform Upstox has openly acknowledged a data breach, weeks...

    Soumik Ghosh
    S Soumik Ghosh
    3 min read
    csoonline.com csoonline.com 2021-04-22 09:01

    Uncertainty looms over UK’s post-Brexit data protection position: What CISOs should do now

    A cloud of uncertainty hangs over the immediate and long-term future of the...

    Michael Hill
    M Michael Hill
    5 min read
    csoonline.com csoonline.com 2021-04-21 01:41

    Spy groups hack into companies using zero-day flaw in Pulse Secure VPN

    Over the past few months, several cyberespionage groups, including one believed...

    Lucian Constantin
    L Lucian Constantin
    3 min read
    What the UK's Cyber Power strategy means for private sector cybersecurity
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-19 09:01

    What the UK's Cyber Power strategy means for private sector cybersecurity

    The UK government is putting cybersecurity at the core of an overarching national security and international policy strategy that aims to enhance the country’s competitiveness in an increasingly digital world. The...

    Michael Hill
    M Michael Hill
    5 min read
    10 most common passwords of 2020 (and 10 tips for better security)
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-15 14:00

    10 most common passwords of 2020 (and 10 tips for better security)

    Pop quiz: What has been the most popular — and therefore least secure — password every year since 2013? If you answered “password,” you’d be close. “Qwerty” is another contender for the dubious...

    • Josh Fruhlinger
      J
    • James A. Martin
      J
    5 min read
    See more, respond faster: Why you should switch to Trend Micro Vision One™
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-13 22:28

    See more, respond faster: Why you should switch to Trend Micro Vision One™

    IT architectures are increasingly complex, cumbersome and difficult to protect. As cybersecurity threats grow in number and sophistication, it’s a constant challenge for CISOs to manage cyber risk and secure...

    association with Trend Micro Vision One
    A association with Trend Micro Vision One
    2 min read
    7 new social engineering tactics threat actors are using now
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-13 14:00

    7 new social engineering tactics threat actors are using now

    It’s been a boom time for social engineering. Pandemic panic, desperation as income concerns grew, and worry over health and wellness made it easier for criminals to tap into fear.Social engineering, of course, means...

    Derek Slater
    D Derek Slater
    5 min read
    What is data poisoning? Attacks thatcorrupt machine learning models
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-12 14:00

    What is data poisoning? Attacks thatcorrupt machine learning models

    Machine learning adoption exploded over the past decade, driven in part by the rise of cloud computing, which has made high performance computing and storage more accessible to all businesses. As vendors integrate...

    Lucian Constantin
    L Lucian Constantin
    7 min read
    What is a zero day? Definition, examples, and defense
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-12 14:00

    What is a zero day? Definition, examples, and defense

    Zero day definitionA zero day is a security flaw for which the vendor of the flawed system has yet to make a patch available to affected users. The name ultimately derives from the world of digital content piracy: if...

    J.M. Porup
    J J.M. Porup
    6 min read
    4 steps to better security hygiene and posture management
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-09 14:00

    4 steps to better security hygiene and posture management

    As the old security adage goes, “a well-managed network/system is a secure network/system," and this notion of network and system management is a cybersecurity foundation.  Pick any framework (e.g., NIST...

    Jon Oltsik
    J Jon Oltsik
    4 min read
    Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-07 00:44

    Top cybercrime gangs use targeted fake job offers to deploy stealthy backdoor

    A group of criminals behind a stealthy backdoor known as more_eggs is targeting professionals with fake job offers tailored to them based on information from their LinkedIn profiles. The gang is selling access to...

    Lucian Constantin
    L Lucian Constantin
    3 min read
    Coca-Cola trade secret theft underscores importance of insider threat early detection
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-06 14:00

    Coca-Cola trade secret theft underscores importance of insider threat early detection

    The trial of Xiaorong You is set to begin today, April 6, in Greenville, TN. She is accused of trade secret theft and economic espionage after allegedly stealing bisphenol-A-free (BPA-free) technologies owned by several...

    Christopher Burgess
    C Christopher Burgess
    3 min read
    The SolarWinds hack timeline: Who knew what, and when?
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-05 14:00

    The SolarWinds hack timeline: Who knew what, and when?

    Details of the 2020 SolarWinds attack continue to unfold, and it may be years before the final damages can be tallied.While it is “hard to say” if the SolarWinds software supply-chain compromise will become known as...

    Pam Baker
    P Pam Baker
    5 min read
    Top 5 skills a SOC analyst needs
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-04-05 14:00

    Top 5 skills a SOC analyst needs

    A security operations center (SOC) analyst works within a team to monitor and fight threats to an organization's IT infrastructure, as well as to identify security weaknesses and opportunities for potential...

    John Edwards
    J John Edwards
    4 min read
    Business continuity and disaster recovery planning: The basics
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-25 14:00

    Business continuity and disaster recovery planning: The basics

    Editor's note: This article, originally published on March 27, 2014, has been updated to more accurately reflect recent trends. Wildfires in California. A snowstorm in Texas.  Windstorms across the Midwest. Floods in...

    Neal Weinberg
    N Neal Weinberg
    6 min read
    The 7 deadly sins of records retention
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-23 14:00

    The 7 deadly sins of records retention

    Editor's note: This article, originally published on March 27, 2014, has been updated to more accurately reflect recent trends. While sports records are made to be broken, enterprise records are made to be...

    John Edwards
    J John Edwards
    4 min read
    Cloudflare wants to be your corporate network backbone with centralized management and security
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-22 18:01

    Cloudflare wants to be your corporate network backbone with centralized management and security

    Cloudflare has added two new major features to its Cloudflare One network-as-a-service platform. Magic WAN allows organizations to connect their branch offices, data centers, cloud assets, and remote workers to its...

    Lucian Constantin
    L Lucian Constantin
    3 min read
    What is Ryuk ransomware? Targeted, devastatingly effective malware
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-19 14:00

    What is Ryuk ransomware? Targeted, devastatingly effective malware

    What is Ryuk ransomware?Ryuk is a sophisticated ransomware threat that has been targeting businesses, hospitals, government institutions and other organizations since 2018. The group behind the malware is known for...

    Lucian Constantin
    L Lucian Constantin
    6 min read
    5 tips for a successful penetration testing program
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-18 14:00

    5 tips for a successful penetration testing program

    With the rise in enterprise data breaches and ransomware cyberattacks making headlines, conducting thorough security assessments has become an inevitable part of running a business operation that handles customer data....

    Ax Sharma
    A Ax Sharma
    5 min read
    5 tips for a successful penetration testing program
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-18 14:00

    5 tips for a successful penetration testing program

    With the rise in enterprise data breaches and ransomware cyberattacks making headlines, conducting thorough security assessments has become an inevitable part of running a business operation that handles customer data....

    Ax Sharma
    A Ax Sharma
    5 min read
    Survey: Australia, NZ organisations now realise their security overconfidence
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-16 04:00

    Survey: Australia, NZ organisations now realise their security overconfidence

    It took a global pandemic, but enterprises and government agencies in Australia and New Zealand are now rethinking their approach to cybersecurity—taking it seriously for the first time in a while. That's the...

    CSO staff
    C CSO staff
    1 min read
    RedEcho taps into India’s power grid
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-15 02:27

    RedEcho taps into India’s power grid

    IT systems at Indian electricity organizations in Maharashtra, Assam, Delhi, and Tamil Nadu have been targeted by a hacking group believed to be based in China, according to security intelligence provider Recorded...

    Soumik Ghosh
    S Soumik Ghosh
    2 min read
    Australia updates its security advice for iOS and Samsung mobile devices
    • twitter
    • facebook
    • email
    csoonline.com csoonline.com 2021-03-15 00:00

    Australia updates its security advice for iOS and Samsung mobile devices

    The Australian Cyber Security Centre (ACSC) has issued updated guidance for securing iPhones, iPads, and iPod Touches running iOS 14 and for securing Samsung’s business-class Galaxy S10, S20, and Note 20 Android...

    Galen Gruman
    G Galen Gruman
    2 min read
    LaptrinhX © 2022
    Latest Posts News raoxyz congtyaz