CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

August 26, 2020

How to secure vulnerable printers on a Windows network

Attackers look for unsecured printers as a point of access. Find them before they do. Here's how. Read more ▶

Image: IBM, Intel, AMD take different routes to hardware-based encryption

IBM, Intel, AMD take different routes to hardware-based encryption

So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs.

Threat hunting explained: Taking an active approach to defense

Threat hunting is the practice of proactively searching for threats that are hiding in an organization's systems – before they attack.

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others.

Solution Brief | ADOBE

Mind the Gap On Your DX Journey: Making Content Work for Your Organization

Learn more about digital transformation in this IDC infobrief!

Is now the time to deploy passwordless options?

Viable options are now available to supplement or eliminate (almost) the need for password authentication. Here are reasons why passwordless might work for you.

7 points your security team needs to know about IPv6 (but probably doesn't)

The IPv6 protocol affects the security of your network even if you haven't deployed it internally. Here are the most important points every security team needs to understand about the protocol.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701