CSO

CSO Update

February 20, 2020

Image: 5 things you should know about cybersecurity insurance

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more ▶

Your Must-Read Stories

•

Recent ransomware attacks define the malware's new age

•

The CSO's playbook for forging board relationships

•

How to set up your network to prevent data loss

•

APIs are becoming a major target for credential stuffing attacks

•

Lack of firmware validation for computer peripherals enables highly persistent attacks

•

12 hottest new cybersecurity startups at RSA 2020

White Paper: The Greater Fort Lauderdale Alliance

Custom Computer Programming Greater Fort Lauderdale

Thanks to Greater Fort Lauderdale’s accessibility and diverse talent pool, the region also provides a solid platform for business opportunity in mobile, cloud, collaboration, cybersecurity and other information and communication technologies (IT) companies. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: The CSO's playbook for forging board relationships

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor. Read more ▶

 
 
Image: How to set up your network to prevent data loss

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP). Read more ▶

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Image: 12 hottest new cybersecurity startups at RSA 2020

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth. Read more ▶

White Paper: The Greater Fort Lauderdale Alliance

Software Publishing Greater Fort Lauderdale

Greater Fort Lauderdale has one of the most established technology industries in the country. In fact, the region is home to the first-ever IBM personal computer and has since become a breeding ground for technology, startups and entrepreneurship. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com