CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

August 05, 2020

8 steps to protecting login credentials

Follow this advice to help users and network admins to better protect login credentials to corporate systems. Read more ▶

Image: What is a dictionary attack? And how you can easily stop them

What is a dictionary attack? And how you can easily stop them

A targeted form of brute force attack, dictionary attacks run through lists of common words, phrases, and leaked password to gain access to accounts.

9 container security tools, and why you need them

Most traditional security tools won't help with protecting container data and images. These options were built specifically for container security.

Bracing for the security data explosion

Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.

Video: What is vishing? Understanding this high-tech phone scam

Vishing (short for voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone. While that makes it sound like an old-fashioned scam, vishing attacks have high-tech elements.

How to properly scope a PCI assessment

Although it might sound straightforward, scoping a PCI assessment can be a challenge even for experienced organizations. Experts offer their best advice for avoiding PCI missteps.

4 drone security issues you should know -- whether or not you deploy them

As use of unmanned aerial vehicles grows, organizations should have a plan for managing the risk associated with drones, whether or not they deploy them, experts say.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701