article thumbnail

Former Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breach

CSO Magazine

Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear. To read this article in full, please click here

CSO 127
article thumbnail

What is Magecart? How this hacker group steals payment card data

CSO Magazine

Here's where the money goes. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here The idea behind these attacks is to compromise a third-party piece of software from a VAR or systems integrator or infect an industrial process unbeknownst to IT. [

CSO 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

CSO Magazine

Editor's note: This article, originally published on July 3, 2019, has been updated with a directory of ISACs and ISAOs.] Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ]. To read this article in full, please click here ISAC and ISAO definition.

article thumbnail

11 cybersecurity buzzwords you should stop using right now

CSO Magazine

Sign up for CSO newsletters. ]. To read this article in full, please click here Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Here are the 11 cybersecurity buzzwords and phrases that should be laid to rest in 2021.

article thumbnail

Insider risk management: Where your program resides shapes its focus

CSO Magazine

In 2019, a CSO article raised the question “ Insider risk management — who’s the boss ?” To read this article in full, please click here Over the years I have hypothesized that where such IRM programs reside within an organization will have a material impact on its focus and possibly its overall effectiveness.

Risk 109
article thumbnail

Critical flaw in AI testing framework MLflow can lead to server and data compromise

CSO Magazine

"Basically, every organization that uses this tool is at risk of losing their AI models, having an internal server compromised, and having their AWS account compromised," Dan McInerney, a senior security engineer with cybersecurity startup Protect AI, told CSO. To read this article in full, please click here It's pretty brutal."

CSO 111
article thumbnail

Why CISOs Are Stepping Away and What the Future Holds

SecureWorld News

The article appeared originally on Medium here. By doing so, they not only improve retention but also strengthen their security posture, enabling their CISOs to thrive in an ever-changing threat landscape. Investing in the well-being, development, and empowerment of CISOs is not just a necessityit's a competitive advantage.

CISO 96