CSO

May 25, 2020

CSO Daily

The day's top cybersecurity news and in-depth coverage

6 hard truths security pros must learn to live with

Crafty hackers, unwitting users, a relentless workload — working in IT security is all about accepting this as business as usual and pushing forward anyway. Read more ▶

eBook | Proofpoint Inc

The Top 10 BEC Scams

Read this e-book to learn Proofpoint's approach to keep your email accounts and data safe.

How Abnormal Security combats business email compromise

Abnormal Security analyzes work relationships, language patterns to spot compromised accounts and stop them from sending mail.

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

White Paper | ConnectWise

Keep Cyber Threats from Destroying Your Company

Every company is a target, no matter its size, function or annual revenue. Security risks come from very direction - malware, social networks and even employees. Every company has information worth protecting, and you owe it to your users to keep every byte safe and secure.

Cybercrime in a recession: 10 things every CISO needs to know

Economic downturns force cybercriminals to change focus and creates conditions for new criminals to join their ranks. Here's how to prepare.

Securing IoT requires a shift to a security fabric

The IoT era and the expectation that everything will be connected, accelerates the need to move away from point products and toward the concept of a security fabric.

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyberattack floodgates; defenders need strong cyber threat intelligence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701