Close Ad
follow
javascript:unhide("superadunit");
United Kingdom
follow
/uk/
10 top API security testing tools
follow
/article/3632856/10-top-api-security-testing-tools.html
How to mitigate the Microsoft Office zero-day attack
follow
/article/3633881/how-to-mitigate-the-microsoft-office-zero-day-attack.html
The new math of cybersecurity value
follow
/article/3632947/the-new-math-of-cybersecurity-value.html
8 pitfalls that undermine security program success
follow
/article/3632428/8-pitfalls-that-undermine-security-program-success.html
More Insider
follow
/insider/
Sign Out
follow
javascript://
Sign In
follow
javascript://
Register
follow
javascript://
follow
/about/learn-about-insider.html
Sign Out
follow
javascript://
Sign In
follow
javascript://
Register
follow
javascript://
Learn More
follow
https://www.idginsiderpro.com/subscribe
The 10 most powerful cybersecurity companies
follow
/article/3531668/the-10-most-powerful-cybersecurity-companies.html
Security and privacy laws, regulations, and compliance: The complete guide
follow
/article/3604334/csos-ultimate-guide-to-security-and-privacy-laws-regulations-and-compliance.html
CSO"s guide to the worst and most notable ransomware
follow
/article/3607649/csos-guide-to-the-worst-and-most-notable-ransomware.html
CISOs’ 15 top strategic priorities for 2021
follow
/article/3628188/cisos-15-top-strategic-priorities-for-2021.html
NEW FROM IDG Learn More
follow
https://www.idginsiderpro.com/subscribe
follow
/about/learn-about-insider.html
Sign Out
follow
javascript://
Sign In
follow
javascript://
Register
follow
javascript://
About Us
follow
/about/about.html
Contact
follow
/about/contactus.html
Reprints
follow
/about/contactus.html#reprints
Privacy Policy
follow
/about/privacy.html
Cookie Policy
follow
/about/cookie-policy.html
Member Preferences
follow
/about/member-preferences.html
Advertising
nofollow
https://www.idg.com/our-brands/cso/
IDG Careers
nofollow
https://www.idg.com/work-here/
Ad Choices
follow
/about/adchoices.html
E-commerce Links
follow
/about/affiliates.html
California: Do Not Sell My Personal Info
follow
/about/ccpa.html
nofollow
http://www.linkedin.com/company/csoonline
nofollow
https://twitter.com/csoonline
nofollow
https://www.facebook.com/CSOonline
Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises
follow
/article/3637124/detecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html
Kraft Heinz dishes up security transformation
follow
/article/3636515/kraft-heinz-dishes-up-security-transformation.html
What is Magecart? How this hacker group steals payment card data
follow
/article/3400381/what-is-magecart-how-this-hacker-group-steals-payment-card-data.html
7 deadly sins of Salesforce security
nofollow
https://www.csoonline.com/article/3635068/7-deadly-sins-of-salesforce-security.html
How corporate data leaks from GitHub repositories
nofollow
https://www.csoonline.com/article/3634784/how-corporate-data-and-secrets-leak-from-github-repositories.html
follow
/article/3634395/6-zero-trust-myths-and-misconceptions.html
6 zero trust myths and misconceptions
follow
/article/3634395/6-zero-trust-myths-and-misconceptions.html
follow
/article/3635849/microsofts-very-bad-year-for-security-a-timeline.html
Microsoft"s very bad year for security: A timeline
follow
/article/3635849/microsofts-very-bad-year-for-security-a-timeline.html
follow
/article/3635894/ssrf-attacks-explained-and-how-to-defend-against-them.html
SSRF attacks explained and how to defend against them
follow
/article/3635894/ssrf-attacks-explained-and-how-to-defend-against-them.html
follow
/article/3634869/top-cybersecurity-statistics-trends-and-facts.html
Top cybersecurity statistics, trends, and facts
follow
/article/3634869/top-cybersecurity-statistics-trends-and-facts.html
follow
/article/3013033/security-recruiter-directory.html
Security Recruiter Directory
follow
/article/3013033/security-recruiter-directory.html
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html&via=csoonline&text=Security+Recruiter+Directory
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html
nofollow
mailto:?Subject=Security Recruiter Directory&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3013033%2Fsecurity-recruiter-directory.html
follow
/article/3638108/decline-in-ransomware-claims-could-spark-change-for-cyber-insurance.html
Decline in ransomware claims could spark change for cyber insurance
follow
/article/3638108/decline-in-ransomware-claims-could-spark-change-for-cyber-insurance.html
Michael Hill
follow
/author/Michael-Hill/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3638108%2Fdecline-in-ransomware-claims-could-spark-change-for-cyber-insurance.html&via=csoonline&text=Decline+in+ransomware+claims+could+spark+change+for+cyber+insurance
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3638108%2Fdecline-in-ransomware-claims-could-spark-change-for-cyber-insurance.html
nofollow
mailto:?Subject=Decline in ransomware claims could spark change for cyber insurance&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3638108%2Fdecline-in-ransomware-claims-could-spark-change-for-cyber-insurance.html
follow
/article/3637124/detecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html
Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises
follow
/article/3637124/detecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html
Lucian Constantin
follow
/author/Lucian-Constantin/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637124%2Fdetecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html&via=csoonline&text=Detecting+anomalies+with+TLS+fingerprints+could+pinpoint+supply+chain
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637124%2Fdetecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html
nofollow
mailto:?Subject=Detecting anomalies with TLS fingerprints could pinpoint supply chain compromises&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637124%2Fdetecting-anomalies-with-tls-fingerprints-could-pinpoint-supply-chain-compromises.html
follow
/article/3636515/kraft-heinz-dishes-up-security-transformation.html
Kraft Heinz dishes up security transformation
follow
/article/3636515/kraft-heinz-dishes-up-security-transformation.html
Mary K. Pratt
follow
/author/Mary-K.-Pratt/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636515%2Fkraft-heinz-dishes-up-security-transformation.html&via=csoonline&text=Kraft+Heinz+dishes+up+security+transformation
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636515%2Fkraft-heinz-dishes-up-security-transformation.html
nofollow
mailto:?Subject=Kraft Heinz dishes up security transformation&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636515%2Fkraft-heinz-dishes-up-security-transformation.html
follow
/article/3400381/what-is-magecart-how-this-hacker-group-steals-payment-card-data.html
What is Magecart? How this hacker group steals payment card data
follow
/article/3400381/what-is-magecart-how-this-hacker-group-steals-payment-card-data.html
David Strom
follow
/author/David-Strom/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3400381%2Fwhat-is-magecart-how-this-hacker-group-steals-payment-card-data.html&via=csoonline&text=What+is+Magecart%3F+How+this+hacker+group+steals+payment+card+data
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3400381%2Fwhat-is-magecart-how-this-hacker-group-steals-payment-card-data.html
nofollow
mailto:?Subject=What is Magecart? How this hacker group steals payment card data&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3400381%2Fwhat-is-magecart-how-this-hacker-group-steals-payment-card-data.html
follow
https://bit.ly/3pkXHen
follow
/article/3637113/new-windows-browser-security-options-and-guidance-what-you-need-to-know.html
New Windows browser security options and guidance: What you need to know
follow
/article/3637113/new-windows-browser-security-options-and-guidance-what-you-need-to-know.html
Susan Bradley
follow
/author/Susan-Bradley/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637113%2Fnew-windows-browser-security-options-and-guidance-what-you-need-to-know.html&via=csoonline&text=New+Windows+browser+security+options+and+guidance%3A+What+you+need+to+know
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637113%2Fnew-windows-browser-security-options-and-guidance-what-you-need-to-know.html
nofollow
mailto:?Subject=New Windows browser security options and guidance: What you need to know&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637113%2Fnew-windows-browser-security-options-and-guidance-what-you-need-to-know.html
follow
/article/3637058/isc2-pilots-new-entry-level-cybersecurity-certification-to-tackle-workforce-shortages.html
(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages
follow
/article/3637058/isc2-pilots-new-entry-level-cybersecurity-certification-to-tackle-workforce-shortages.html
Michael Hill
follow
/author/Michael-Hill/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637058%2Fisc2-pilots-new-entry-level-cybersecurity-certification-to-tackle-workforce-shortages.html&via=csoonline&text=%28ISC%292+pilots+new+entry-level+cybersecurity+certification+to+tackle+workforce
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637058%2Fisc2-pilots-new-entry-level-cybersecurity-certification-to-tackle-workforce-shortages.html
nofollow
mailto:?Subject=(ISC)2 pilots new entry-level cybersecurity certification to tackle workforce shortages&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637058%2Fisc2-pilots-new-entry-level-cybersecurity-certification-to-tackle-workforce-shortages.html
follow
/article/3635894/ssrf-attacks-explained-and-how-to-defend-against-them.html
SSRF attacks explained and how to defend against them
follow
/article/3635894/ssrf-attacks-explained-and-how-to-defend-against-them.html
Ax Sharma
follow
/author/Ax-Sharma/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635894%2Fssrf-attacks-explained-and-how-to-defend-against-them.html&via=csoonline&text=SSRF+attacks+explained+and+how+to+defend+against+them
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635894%2Fssrf-attacks-explained-and-how-to-defend-against-them.html
nofollow
mailto:?Subject=SSRF attacks explained and how to defend against them&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635894%2Fssrf-attacks-explained-and-how-to-defend-against-them.html
follow
/article/3636449/8-top-multifactor-authentication-products-and-how-to-choose-an-mfa-solution.html
8 top multifactor authentication products and how to choose an MFA solution
follow
/article/3636449/8-top-multifactor-authentication-products-and-how-to-choose-an-mfa-solution.html
Tim Ferrill
follow
/author/Tim-Ferrill/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636449%2F8-top-multifactor-authentication-products-and-how-to-choose-an-mfa-solution.html&via=csoonline&text=8+top+multifactor+authentication+products+and+how+to+choose+an+MFA+solution
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636449%2F8-top-multifactor-authentication-products-and-how-to-choose-an-mfa-solution.html
nofollow
mailto:?Subject=8 top multifactor authentication products and how to choose an MFA solution&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636449%2F8-top-multifactor-authentication-products-and-how-to-choose-an-mfa-solution.html
follow
/article/3637118/white-house-international-ransomware-initiative-outlines-hopes-and-challenges.html
White House international ransomware initiative outlines hopes and challenges
follow
/article/3637118/white-house-international-ransomware-initiative-outlines-hopes-and-challenges.html
Christopher Burgess
follow
/author/Christopher-Burgess/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637118%2Fwhite-house-international-ransomware-initiative-outlines-hopes-and-challenges.html&via=csoonline&text=White+House+international+ransomware+initiative+outlines+hopes+and+challenges
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637118%2Fwhite-house-international-ransomware-initiative-outlines-hopes-and-challenges.html
nofollow
mailto:?Subject=White House international ransomware initiative outlines hopes and challenges&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3637118%2Fwhite-house-international-ransomware-initiative-outlines-hopes-and-challenges.html
Popular Resources
follow
/resources
View All
follow
/resources
follow
/resources/226394/5-obstacles-when-complying-with-upcoming-regulations-and-how-to-overcome-them
5 Obstacles when Complying with Upcoming Regulations and How to Overcome Them
follow
/resources/226394/5-obstacles-when-complying-with-upcoming-regulations-and-how-to-overcome-them
follow
/article/3635849/microsofts-very-bad-year-for-security-a-timeline.html
Microsoft"s very bad year for security: A timeline
follow
/article/3635849/microsofts-very-bad-year-for-security-a-timeline.html
Michael Hill
follow
/author/Michael-Hill/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635849%2Fmicrosofts-very-bad-year-for-security-a-timeline.html&via=csoonline&text=Microsoft%27s+very+bad+year+for+security%3A+A+timeline
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635849%2Fmicrosofts-very-bad-year-for-security-a-timeline.html
nofollow
mailto:?Subject=Microsoft"s very bad year for security: A timeline&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3635849%2Fmicrosofts-very-bad-year-for-security-a-timeline.html
follow
/article/3634395/6-zero-trust-myths-and-misconceptions.html
6 zero trust myths and misconceptions
follow
/article/3634395/6-zero-trust-myths-and-misconceptions.html
Neal Weinberg
follow
/author/Neal-Weinberg/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3634395%2F6-zero-trust-myths-and-misconceptions.html&via=csoonline&text=6+zero+trust+myths+and+misconceptions
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3634395%2F6-zero-trust-myths-and-misconceptions.html
nofollow
mailto:?Subject=6 zero trust myths and misconceptions&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3634395%2F6-zero-trust-myths-and-misconceptions.html
follow
/article/3614764/top-cybersecurity-manda-deals-for-2021.html
Top cybersecurity M&A deals for 2021
follow
/article/3614764/top-cybersecurity-manda-deals-for-2021.html
CSO staff
follow
/author/CSO-staff/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3614764%2Ftop-cybersecurity-manda-deals-for-2021.html&via=csoonline&text=Top+cybersecurity+M%26A+deals+for+2021
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3614764%2Ftop-cybersecurity-manda-deals-for-2021.html
nofollow
mailto:?Subject=Top cybersecurity M&A deals for 2021&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3614764%2Ftop-cybersecurity-manda-deals-for-2021.html
follow
/article/3636456/how-shape-shifting-threat-actors-complicate-attack-attribution.html
How shape-shifting threat actors complicate attack attribution
follow
/article/3636456/how-shape-shifting-threat-actors-complicate-attack-attribution.html
Cynthia Brumfield
follow
/author/Cynthia-Brumfield/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636456%2Fhow-shape-shifting-threat-actors-complicate-attack-attribution.html&via=csoonline&text=How+shape-shifting+threat+actors+complicate+attack+attribution
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636456%2Fhow-shape-shifting-threat-actors-complicate-attack-attribution.html
nofollow
mailto:?Subject=How shape-shifting threat actors complicate attack attribution&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3636456%2Fhow-shape-shifting-threat-actors-complicate-attack-attribution.html
follow
/article/3597298/revil-ransomware-explained-a-widespread-extortion-operation.html
REvil ransomware explained: A widespread extortion operation
follow
/article/3597298/revil-ransomware-explained-a-widespread-extortion-operation.html
Lucian Constantin
follow
/author/Lucian-Constantin/
follow
https://twitter.com/intent/tweet?url=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3597298%2Frevil-ransomware-explained-a-widespread-extortion-operation.html&via=csoonline&text=REvil+ransomware+explained%3A+A+widespread+extortion+operation
follow
https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3597298%2Frevil-ransomware-explained-a-widespread-extortion-operation.html
nofollow
mailto:?Subject=REvil ransomware explained: A widespread extortion operation&Body=Check%20out%20this%20article%20from%20CSO Online%3A%20https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3597298%2Frevil-ransomware-explained-a-widespread-extortion-operation.html
follow
/newsletters/signup.html
Get the best of CSO delivered to your inbox. Sign up for our free newsletters
follow
/newsletters/signup.html
Subscribe
follow
/newsletters/signup.html
follow
https://hpwolfsecurity.csoonline.com/p/1?utm_source=cso&utm_medium=organic&utm_campaign=hpwolf&utm_content=CSO_home
Featured Sponsor HP Wolf Security The Need for Endpoint Security Rooted In Zero Trust
follow
https://hpwolfsecurity.csoonline.com/p/1?utm_source=cso&utm_medium=organic&utm_campaign=hpwolf&utm_content=CSO_home
follow
/article/3637874/cis-csat-pro-v1-7-cis-controls-v8-assessment-and-more.html
Sponsored by CIS CIS CSAT Pro v1.7: CIS Controls v8 Assessment and More
follow
/article/3637874/cis-csat-pro-v1-7-cis-controls-v8-assessment-and-more.html
follow
/article/3637117/your-employees-aren-t-the-problem-it-s-your-technology.html
Sponsored by Code42 Your Employees Aren’t the Problem—It’s Your Technology
follow
/article/3637117/your-employees-aren-t-the-problem-it-s-your-technology.html
follow
/article/3637108/fighting-video-piracy-is-strengthened-by-collaboration.html
Sponsored by Akamai Fighting Video Piracy Is Strengthened by Collaboration
follow
/article/3637108/fighting-video-piracy-is-strengthened-by-collaboration.html
nofollow
http://www.linkedin.com/company/csoonline
nofollow
https://twitter.com/csoonline
nofollow
https://www.facebook.com/CSOonline
About Us
follow
/about/about.html
Contact
follow
/about/contactus.html
Reprints
follow
/about/contactus.html#reprints
Privacy Policy
follow
/about/privacy.html
Cookie Policy
follow
/about/cookie-policy.html
Member Preferences
follow
/about/member-preferences.html
Advertising
nofollow
https://www.idg.com/our-brands/cso/
IDG Careers
nofollow
https://www.idg.com/work-here/
Ad Choices
follow
/about/adchoices.html
E-commerce Links
follow
/about/affiliates.html
California: Do Not Sell My Personal Info
follow
/about/ccpa.html
Copyright
follow
/about/tos.html
CIO
nofollow
https://www.cio.com
Computerworld
nofollow
https://www.computerworld.com
CSO Online
nofollow
https://www.csoonline.com
InfoWorld
nofollow
https://www.infoworld.com
Network World
nofollow
https://www.networkworld.com