May 13, 2020
Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk. Read more â¶
Simplifying threat detection and response
Volterra provides protected, distributed clouds for almost any application or network
Episode 9: Donât be Batman: Why CISOs should embrace the sidekick role, Part 1
Enhanced Privilege Access Management Solutions
Ryuk ransomware explained: A targeted, devastatingly effective attack
Attacks against internet-exposed RDP servers surging during COVID-19 pandemic
Hardware vulnerabilities: A guide to the most significant threats
Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues â and outline actionable advice for IT and security practitioners alike. Read more â¶
The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.
Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.
Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Read more â¶
Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.
Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.