CSO

CSO Daily

April 10, 2020

Image: 14 real-world phishing examples — and how to recognize them

14 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

Your Must-Read Stories

•

What are vulnerability scanners and how do they work?

•

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

•

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

•

Microsoft Threat Protection: What security and IT admins need to know

•

Review: Ericom Shield extends zero trust to websites with browser isolation

•

6 security metrics that matter – and 4 that don’t

Miscellaneous: ServiceNow Inc

The Three Customer Service Megatrends in 2020: Fuse AI and Agents to Drive Better Experiences

Offering poor customer service is no longer an option and can potentially cost organizations tens of billions in revenue according to Forrester. Read more ▶

Image: What are vulnerability scanners and how do they work?

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now. Read more ▶

 
 
Image: New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

New, rapidly evolving IoT botnet Dark Nexus targets wide variety of devices

The sophisticated botnet also has high persistence and is capable of delivering different types of malware in addition to launching DDoS attacks. Read more ▶

Image: Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing. Read more ▶

Image: Review: Ericom Shield extends zero trust to websites with browser isolation

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out. Read more ▶

Image: 6 security metrics that matter – and 4 that don’t

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more ▶

White Paper: Digi International

ANY-G TO LTE: The Top Five Considerations From Migrating to 4G, 5G and Beyond

Over the next two years, millions of 3G M2M and IoT devices will need to migrate to LTE networks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com