CSO

CSO Daily

May 13, 2020

Image: 9 tips to detect and prevent web shell attacks on Windows networks

9 tips to detect and prevent web shell attacks on Windows networks

Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk. Read more ▶

Your Must-Read Stories

•

Simplifying threat detection and response

•

Volterra provides protected, distributed clouds for almost any application or network

•

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

•

Enhanced Privilege Access Management Solutions

•

Ryuk ransomware explained: A targeted, devastatingly effective attack

•

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

•

Hardware vulnerabilities: A guide to the most significant threats

Video/Webcast: CENTURYLINK

Simplifying threat detection and response

Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues – and outline actionable advice for IT and security practitioners alike. Read more ▶

Image: Volterra provides protected, distributed clouds for almost any application or network

Volterra provides protected, distributed clouds for almost any application or network

The Volterra platform still seems a bit like a work in progress, but the core components are there and ready for companies that want to finally start consolidating their cloud and network management tools and devices.

Image: Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Episode 9: Don’t be Batman: Why CISOs should embrace the sidekick role, Part 1

Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.

White Paper: One Identity

Enhanced Privilege Access Management Solutions

Privileged Access Management (PAM) is one of the most important areas of risk management and security in any organization. Read more ▶

Image: Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

Image: Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Image: Hardware vulnerabilities: A guide to the most significant threats

Hardware vulnerabilities: A guide to the most significant threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats.

Twitter Facebook LinkedIn
Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com