CSO

CSO Daily

February 24, 2020

Image: Hottest new cybersecurity products at RSA Conference 2020

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

Your Must-Read Stories

•

Lack of firmware validation for computer peripherals enables highly persistent attacks

•

APIs are becoming a major target for credential stuffing attacks

•

Kali Linux explained: A pentester’s toolkit

•

5G security is a mess. Could digital certificates help?

•

Recent ransomware attacks define the malware's new age

•

5 things you should know about cybersecurity insurance

White Paper: Pythian

Designing a Modern Data Platform on Google Cloud

This paper aggregates a lot of Pythian's thinking on cloud platform design. Read more ▶

Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

 
 
Image: Kali Linux explained: A pentester’s toolkit

Kali Linux explained: A pentester’s toolkit

Kali Linux is the most popular penetration testing Linux distro, and jam packed with almost every offensive security tool you can think of. Read more ▶

Image: 5G security is a mess. Could digital certificates help?

5G security is a mess. Could digital certificates help?

5G inherited security vulnerabilities from earlier mobile technology, but digital certificates might solve the issue of unauthenticated messages. Read more ▶

Image: Recent ransomware attacks define the malware's new age

Recent ransomware attacks define the malware's new age

By 2018, the ransomware boom seemed to have peaked. But over the past 24 months, shifts in hacker tactics have resulted in a resurgence of ransomware attacks. Read more ▶

Image: 5 things you should know about cybersecurity insurance

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com