Remove Article Remove CSO Remove Risk
article thumbnail

Security teams report rise in cyber risk

CSO Magazine

If you are like 80% of respondents to the Trend Micro’s biannual Cyber Risk Index (CRI) report, you expect to experience a data breach that compromises customer data in the next 12 months. Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ].

article thumbnail

CSO Global Intelligence Report: The State of Cybersecurity in 2021

CSO Magazine

Any lingering indifference to cybersecurity risk has evaporated in the face of spiking ransomware attacks, software supply chain threats , and the challenges of securing remote workers. That’s the clear message of CSO’s Global Intelligence Report: The State of Cybersecurity in 2021, fielded via online survey in May and June of this year.

CSO 144
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 risk factors to know when hiring an MSSP

CSO Magazine

With enterprise adoption of managed security services gradually maturing, the rewards and risks of using these services have become a lot clearer for current and potential customers. Sign up for CSO newsletters. ]. To read this article in full, please click here Keep up with 8 hot cyber security trends (and 4 going cold).

Risk 138
article thumbnail

Amazon Sidewalk highlights network security visibility risks consumer services pose

CSO Magazine

New research from security firm Cato Networks has highlighted potential security risks surrounding the use of Amazon sidewalk and other consumer-grade services that connect to corporate networks due to a lack of visibility. Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here

article thumbnail

Unpatched Exchange Servers an overlooked risk

CSO Magazine

Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here Use of known/fixed/default passwords and credentials. Learn the must-have features in a modern network security architecture. |

CSO 127
article thumbnail

Insider risk management: Where your program resides shapes its focus

CSO Magazine

Today we call programs that help prevent or identify breaches of trust insider risk management (IRM). In 2019, a CSO article raised the question “ Insider risk management — who’s the boss ?” To read this article in full, please click here

Risk 109
article thumbnail

Chris Wysopal: Open source is becoming a national security risk

CSO Magazine

Chris Wysopal, founder and chief technology officer of application security company Veracode, sat down with CSO Senior Writer Lucian Constantin at a recent Security Summit to discuss just that. To read this article in full, please click here

CSO 127