article thumbnail

Inactive accounts pose significant account takeover security risks

CSO Magazine

Inactive and non-maintained accounts pose significant security risks to users and businesses, with cybercriminals adept at using information stolen from forgotten or otherwise non-upheld accounts to exploit active accounts. To read this article in full, please click here

article thumbnail

Spotlight: Traceable CSO Richard Bird on Securing the API Economy

The Security Ledger

In this Spotlight episode of the Security Ledger podcast, I interview Richard Bird, the CSO of the firm Traceable AI about the challenge of securing application programming interfaces (APIs), which are increasingly being abused to steal sensitive data. The post Spotlight: Traceable CSO Richard Bird on Securing the API Economy appeared first.

CSO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Best practices.

article thumbnail

IT asset disposal is a security risk CISOs need to take seriously

CSO Magazine

Lack of a program signals data may be at risk when equipment is recycled; presence of a program signals attention to data protection. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.

CISO 116
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

By spearheading cybersecurity programs, CISOs empower organizations to fend off cyber threats from criminal enterprises, insider risks, hackers, and other malicious entities that pose significant risks to operations, critical infrastructure, and even national security. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.

CISO 76
article thumbnail

Critical flaw in AI testing framework MLflow can lead to server and data compromise

CSO Magazine

Basically, every organization that uses this tool is at risk of losing their AI models, having an internal server compromised, and having their AWS account compromised," Dan McInerney, a senior security engineer with cybersecurity startup Protect AI, told CSO. It's pretty brutal."

CSO 111
article thumbnail

GAO calls out US government agencies: Get your supply chain security act together

CSO Magazine

In December 2020, the US Government Accounting Office (GAO) made 145 recommendations to 23 federal agencies relating to supply chain risks. D’Souza, testified before Congress on supply chain risks. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].