CSO

CSO Daily

May 15, 2020

Image: Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now. Read more ▶

Your Must-Read Stories

•

Simplifying threat detection and response

•

6 ways attackers are exploiting the COVID-19 crisis

•

How IoT changes your threat model: 4 key considerations

•

Introducing the IDG TECH(talk) Community

•

4 critical issues surrounding contact-tracing apps

•

Managing Third-party Risk in Times of Uncertainty

•

Ryuk ransomware explained: A targeted, devastatingly effective attack

•

4 key benefits of NOC/SOC integration and tips for making it work

•

The CSO guide to top security conferences, 2020

Video/Webcast: CENTURYLINK

Simplifying threat detection and response

Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues – and outline actionable advice for IT and security practitioners alike. Read more ▶

Image: 6 ways attackers are exploiting the COVID-19 crisis

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

Image: How IoT changes your threat model: 4 key considerations

How IoT changes your threat model: 4 key considerations

More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.

Image: Introducing the IDG TECH(talk) Community

Introducing the IDG TECH(talk) Community

Join the IDG TECH(talk) Community, an exclusive online network where IT experts find resources to enhance their knowledge and career. Engage with peers on industry challenges, market trends, emerging technology, case studies, and more.

Image: 4 critical issues surrounding contact-tracing apps

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Video/Webcast: SecurityScorecard

Managing Third-party Risk in Times of Uncertainty

The world of risk management is undergoing big changes due to ripple effects stemming from the COVID-19 pandemic. Read more ▶

Image: Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

Image: 4 key benefits of NOC/SOC integration and tips for making it work

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

Image: The CSO guide to top security conferences, 2020

The CSO guide to top security conferences, 2020

Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Twitter Facebook LinkedIn
Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com