CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

November 24, 2020

8 types of phishing attack and how to identify them

Phishing comes in many forms, from spear phishing, whaling and business-email compromise to clone phishing, vishing and snowshoeing. Here's how to recognize each type of phishing attack. Read more ▶

Image: Sponsored by CyberArk: Red Team v. Blue Team: Cloud Attack Vectors

Sponsored by CyberArk: Red Team v. Blue Team: Cloud Attack Vectors

Join us for CyberArk’s ‘Attack & Defend” Cloud series – a virtual war room simulation featuring common cloud attack paths and the tools and mitigation tactics your organization needs to secure privileged credentials in cloud and hybrid environments. Think like an attacker and stay one step ahead!

New US IoT law aims to improve edge device security

The Internet of Things Cybersecurity Improvement Act will require device manufacturers to meet new security standards for government contracts. Carryover effect expected for the private sector.

7 dumb ways to be a ransomware victim, and how to avoid them

Don't make it easy for ransomware attackers. Review your Windows network for these weaknesses now. You might be surprised by what you find.

21 best free security tools

Check out these free, standout software tools that will make your daily security work easier.

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701