CSO

CSO Update

August 08, 2019

Image: 11 new state privacy and security laws explained: Is your business ready?

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more ▶

Your Must-Read Stories

•

New Spectre-like CPU vulnerability bypasses existing defenses

•

Know your Edge Chromium security options

•

Famous social engineering attacks: 12 crafty cons

•

6 lessons from Venmo’s lax approach to API security

•

How attackers identify your organization's weakest links

•

12 tips for effectively presenting cybersecurity to the board

eBook: Base2 Solutions

Case Study Ebook: Stories of Digital Innovation

Digital Innovation (DI) can provide meaningful impacts for businesses of all types – companies looking for a competitive edge need to embrace DI. Read more ▶

Image: New Spectre-like CPU vulnerability bypasses existing defenses

New Spectre-like CPU vulnerability bypasses existing defenses

The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Know your Edge Chromium security options

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more ▶

 
 
Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: 6 lessons from Venmo’s lax approach to API security

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: How attackers identify your organization's weakest links

How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Miscellaneous: Adobe Systems Inc.

Forrester TEI Adobe Sign

Cost savings and business benefits enabled by Adobe Sign. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.