CSO

CSO Daily

February 27, 2020

Image: A security guide for pandemic planning: 7 key steps

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas. Read more ▶

Your Must-Read Stories

•

11 penetration testing tools the pros use

•

Hottest new cybersecurity products at RSA Conference 2020

•

8 mobile security threats you should take seriously in 2020

•

How to prevent scripting attacks in Microsoft Office

•

APIs are becoming a major target for credential stuffing attacks

•

Recent ransomware attacks define the malware's new age

Miscellaneous: Databricks

2020 Gartner Magic Quadrant for Data Science and Machine Learning Platforms

Gartner names Databricks a Magic Quadrant Leader in Data Science and Machine Learning Platform. Read more ▶

Image: 11 penetration testing tools the pros use

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Hottest new cybersecurity products at RSA Conference 2020

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

 
 
Image: 8 mobile security threats you should take seriously in 2020

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues. Read more ▶

Image: How to prevent scripting attacks in Microsoft Office

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script. Read more ▶

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

Miscellaneous: CPP, a Hewlett Packard Enterprise Platinum Solution Provider

A Storage Solution That’s Timeless and Nimble

Read this brochure to learn how a pay-as-you-go flash storage solution such as HPE Nimble Storage can help your organization eliminate unnecessary downtime, save on data storage management costs, and flexibly manage your workload needs as they evolve. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com