CSO

CSO Daily

May 14, 2020

Image: 4 critical issues surrounding contact-tracing apps

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls. Read more ▶

Your Must-Read Stories

•

Simplifying threat detection and response

•

4 key benefits of NOC/SOC integration and tips for making it work

•

9 tips to detect and prevent web shell attacks on Windows networks

•

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

•

COVID-19 pandemic accelerates transformation in enterprise security

•

Ryuk ransomware explained: A targeted, devastatingly effective attack

•

How IoT changes your threat model: 4 key considerations

Video/Webcast: CENTURYLINK

Simplifying threat detection and response

Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues – and outline actionable advice for IT and security practitioners alike. Read more ▶

Image: 4 key benefits of NOC/SOC integration and tips for making it work

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

Image: 9 tips to detect and prevent web shell attacks on Windows networks

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.

Image: Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

Image: COVID-19 pandemic accelerates transformation in enterprise security

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

Image: Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

Image: How IoT changes your threat model: 4 key considerations

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

Twitter Facebook LinkedIn
Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com