CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

September 28, 2020

4 hot areas for encryption innovation

Researchers are making progress on a variety of approaches to strengthen encryption techniques and algorithms. Here are some of the hottest areas in cryptographic research. Read more ▶

Image: Identity theft explained: Why businesses make tempting targets

Identity theft explained: Why businesses make tempting targets

Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.

Preventing insider threats: What to watch (and watch out) for

Understanding human behaviors that precede malicious actions from an insider is the best way to avoid data loss or disruption, experts say.

SAP ASE leaves sensitive credentials in installation logs

Two vulnerabilities in SAP ASE's Cockpit component leaves some sensitive information available to anyone on the network and other data susceptible to brute-force attacks.

Microsoft's Zerologon vulnerability fix: What admins need to know

Microsoft patched its Netlogon Remote Protocol to prevent Zerologon exploits, but a second update is coming in February. Here's what you need to do now to prepare.

Eli Lilly security finds strength in flexibility in WFH shift

CISO Meredith Harper shares the greatest challenges her organization faced in the wide-scale move to work-from-home and lessons learned that will outlast the pandemic.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701