CSO

CSO Daily

February 25, 2020

Image: 8 mobile security threats you should take seriously in 2020

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year. Read more ▶

Your Must-Read Stories

•

Review: Achieving enlightened segmentation with Illumio

•

Kali Linux explained: A pentester’s toolkit

•

Hottest new cybersecurity products at RSA Conference 2020

•

5G security is a mess. Could digital certificates help?

•

Lack of firmware validation for computer peripherals enables highly persistent attacks

•

Recent ransomware attacks define the malware's new age

Miscellaneous: Databricks

2020 Gartner Magic Quadrant for Data Science and Machine Learning Platforms

Gartner names Databricks a Magic Quadrant Leader in Data Science and Machine Learning Platform. Read more ▶

Image: Review: Achieving enlightened segmentation with Illumio

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches. Read more ▶

Image: Train to become a skilled Python coder for just $50

DEALPOST

Train to become a skilled Python coder for just $50

This 12-course bundle introduces students to the language and shows them how to use it in real world applications. Read more ▶

Image: Kali Linux explained: A pentester’s toolkit

Kali Linux explained: A pentester’s toolkit

Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of. Read more ▶

 
 
Image: Hottest new cybersecurity products at RSA Conference 2020

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

Image: 5G security is a mess. Could digital certificates help?

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages. Read more ▶

Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

White Paper: Talend & AWS

Turning Machine Learning into Business Applications

This white paper shows how Talend and AWS are bridging the gap between data scientists and data engineers to operationalize ML. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com