Remove Blog Remove CSO Remove Threat Detection
article thumbnail

Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros

Security Boulevard

Data risk-management strategies driven by regulation compliance, creating gaps for addressing emerging threats Recommendations include adopting proactive risk management, including vulnerability management, real-time monitoring and advanced threat detection.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyber risk owners better prepare for the evolving landscape. This convergence requires CISOs to go beyond traditional security practices and prove their business value.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Roundup April 2025

BH Consulting

The report also details progress across six engineering pillars: protecting identities and secrets, tenant isolation, network security, engineering systems, threat detection, and incident response. CSO Online marked the progress as 66 per cent done. The company says 99.2 The company says 99.2

article thumbnail

A Clear and Present Need: Bolster Your Identity Security with Threat Detection and Response

Duo's Security Blog

“It took nearly 11 months (328 days) to identity and contain data breaches resulting from stolen or compromised credentials.” – IBM’s Cost of Data Breach Report 2023 I recently came across a 2012 article from CSO Online , and realized that it has been more than 11 years since the phrase “Identity is the new perimeter” was coined!

article thumbnail

How security vendors are aiding Ukraine

CSO Magazine

Vectra AI: Threat detection and response vendor Vectra AI is offering a slate of free cybersecurity tools and services to organizations who believe they may be targeted by cyberattacks in the Ukraine-Russia conflict. Here is a list of the cybersecurity vendors currently known to be offering aid.

article thumbnail

BrandPost: Analyzing a Supply Chain Attack to Improve Threat Protection

CSO Magazine

In this blog, Todd Kemmerling, Director of Data Science at ExtraHop, reconstructs the timeline of the attack over the past 9+ months and provides insights about how to improve threat detection in the future. . A forensic examination of SUNBURST before detection. To read this article in full, please click here

article thumbnail

BrandPost: Origin Story Part 2: A Forensic Examination of SUNBURST After Detection

CSO Magazine

This two-part blog series is an examination of the attack by Todd Kemmerling, Director of Data Science at ExtraHop, to reconstruct the timeline of the attack over the past 9+ months and provide insights about how to improve threat detection in the future. ( See Part 1.) To read this article in full, please click here