CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

June 18, 2020

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own. Read more ▶

White Paper | Tempered

The summer CSO magazine is here. Don't miss out!

Breach concerns, data privacy regulations and new responsibilities for managing risk are elevating the security leadership role

Revised DOJ compliance guidance offers risk-management lessons for cybersecurity leaders

Prosecutors use this guidance to assess criminal liability in a compliance breach, so it behooves business and security leaders to understand the expectations.

Critical flaws in embedded TCP/IP library impact millions of IoT devices across industries

The memory corruption flaws exist in a wide range of commercial and consumer devices, and can allow full takeover of them.

Video/Webcast | Zones

Cisco SecureX: Simplify your security needs with the broadest, most integrated platform

Join Zones and our strategic partner, Cisco, to learn how to confidently secure every business endeavor with an open, integrated platform that scales to meet your security needs.

The most important Windows 10 security event log IDs to monitor

Regular reviewing of these Windows event logs alone or in combination might be your best chance to identify malicious activity early.

White Paper | Quest Software

Strengthen Endpoint Security with the Quest KACE AMA

Integrating the KACE AMA with your Microsoft SCCM implementation strengthens both products to ensure that all your endpoints are always protected in today’s complex IT environment.

Whitelisting explained: How it works and where it fits in a security program

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it makes sense in certain scenarios.

Skipped patch from 2012 makes old Microsoft Office systems a favored target

Some organizations have still not implemented an Office patch from 2012. Attackers know this and are exploiting the vulnerability.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701