CSO

CSO Daily

February 19, 2020

Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Your Must-Read Stories

•

How to set up your network to prevent data loss

•

12 hottest new cybersecurity startups at RSA 2020

•

5 things you should know about cybersecurity insurance

•

The CSO's playbook for forging board relationships

•

Recent cyber attacks show disturbing trends

•

Best Android antivirus: The top 11 tools

eBook: ServiceNow Inc

Now on Now Story: Taking Charge of ServiceNow’s IT Project Portfolio

In this eBook, we explain the ServiceNow® IT Business Management (ITBM) journey–how we’ve transformed the way we manage our IT project portfolio to deliver predictable, high-value business outcomes. Read more ▶

Image: How to set up your network to prevent data loss

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP). Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: 12 hottest new cybersecurity startups at RSA 2020

12 hottest new cybersecurity startups at RSA 2020

Cybersecurity startup companies use the RSA Conference to make their public debut and showcase their products. These are some of the more interesting startups coming out of stealth. Read more ▶

 
 
Image: 5 things you should know about cybersecurity insurance

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more ▶

Image: The CSO's playbook for forging board relationships

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor. Read more ▶

Image: Recent cyber attacks show disturbing trends

Recent cyber attacks show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them. Read more ▶

Image: Best Android antivirus: The top 11 tools

Best Android antivirus: The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features. Read more ▶

White Paper: Netsparker

Building an Enterprise Web Security Process

You cannot achieve complete web application security in a large organization using a simple vulnerability scanner. You need to choose the right tools and build a comprehensive and scalable enterprise web security process. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com