CSO

CSO Daily

February 22, 2019

Image: 6 ways to equip your phishing tackle box

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most. Read more ▶

Your Must-Read Stories

•

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

•

DDoS explained: How distributed denial of service attacks are evolving

•

The CSO guide to top security conferences, 2019

•

IoT botnets target Polycom video conferencing systems

•

Are zero-day exploits the new norm?

•

The cybersecurity legislation agenda: 5 areas to watch

White Paper: Zapproved, Inc

How to Guide: Establishing Process

In Start Here: A How-to Guide to Establishing an Ediscovery Process, we’ve given stage-by-stage advice about how to achieve real, measurable improvements in your ediscovery. We cover every step from legal holds to post-matter resolution, complete with best practices and a helpful checklist for reference. In short, this practical guide can help you create and implement an effective, modern ediscovery process. Read more ▶

Image: Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: DDoS explained: How distributed denial of service attacks are evolving

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger. Read more ▶

 
 
Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

Image: IoT botnets target Polycom video conferencing systems

IoT botnets target Polycom video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more ▶

Image: Are zero-day exploits the new norm?

Are zero-day exploits the new norm?

Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more ▶

Image: The cybersecurity legislation agenda: 5 areas to watch

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list. Read more ▶

eBook: Numerify

Visibility to Drive Digital Transformation

What exactly is a System of Intelligence for IT? Powered by Machine Learning algorithms, built on modern big-data platforms, and leveraging data from all IT systems, a System of Intelligence delivers the insights needed to drive innovation and efficiencies across an organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.