Security | News, how-tos, features, reviews, and videos
Unified endpoint management (UEM) platforms now dominate the enterprise mobile security space. This chart lets you quickly compare features and functions from eight top vendors.
We explore the risks to both IT and the business from the use of AI. The goal of your risk management efforts should be to gain the most value from AI as a result.
Analyzing leaked internal communication logs, security researchers are piecing together how one of the most notorious ransomware groups infiltrates its victims.
Businesses that install and own solar distributed energy resources increase their attack surface and that of the electric grid.
The civil suit against four members of Storm-2139 underscores an emerging trend that blends stolen LLM credentials and AI jailbreaking to reap financial gains for cybercriminals and losses for companies they exploit.
A zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach.
Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
Unpatched flaw CVE-2024-49035 allows unauthenticated privilege escalation, posing supply chain risks
Attackers are shifting tactics, targeting mid-size companies and critical infrastructure sectors, while generative AI risks threaten to overshadow a focus on cyber hygiene.
When it comes to implementing Open Authorization (OAuth) technology, constant monitoring and review is the key to maintaining a properly secure organization.