CSO

CSO Daily

February 20, 2020

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

Your Must-Read Stories

•

Recent ransomware attacks define the malware's new age

•

The CCPA is an opportunity to get your data security house in order

•

5 things you should know about cybersecurity insurance

•

Lack of firmware validation for computer peripherals enables highly persistent attacks

•

How to set up your network to prevent data loss

•

12 hottest new cybersecurity startups at RSA 2020

White Paper: The Greater Fort Lauderdale Alliance

Custom Computer Programming Greater Fort Lauderdale

Thanks to Greater Fort Lauderdale’s accessibility and diverse talent pool, the region also provides a solid platform for business opportunity in mobile, cloud, collaboration, cybersecurity and other information and communication technologies (IT) companies. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: The CCPA is an opportunity to get your data security house in order

The CCPA is an opportunity to get your data security house in order

As California’s privacy legislation goes into effect, it’s time to take stock of your security strategies around data and think about the future. The trend towards greater privacy is set to continue. Read more ▶

 
 
Image: 5 things you should know about cybersecurity insurance

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more ▶

Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Image: How to set up your network to prevent data loss

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP). Read more ▶

Image: 12 hottest new cybersecurity startups at RSA 2020

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth. Read more ▶

White Paper: The Greater Fort Lauderdale Alliance

Software Publishing Greater Fort Lauderdale

Greater Fort Lauderdale has one of the most established technology industries in the country. In fact, the region is home to the first-ever IBM personal computer and has since become a breeding ground for technology, startups and entrepreneurship. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com