CSO

CSO Daily

April 23, 2020

Image: Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

The COVID-19 Cyber Threat Intelligence League and other groups cooperate with the industry, law enforcement, and the government to prevent attacks on healthcare providers. Read more ▶

Your Must-Read Stories

•

Pharming explained: How attackers use fake websites to steal data

•

Google enters zero-trust market with BeyondCorp Remote Access offering

•

How to check your Windows network for vulnerabilities

•

8 video chat apps compared: Which is best for security?

•

How Prudential measures its security culture to identify risk

•

How to lock down Remote Desktop Protocol servers

White Paper: Robin.io

Unlocking the Full Potential of Elastic Stack on Kubernetes

How to Choose the Right Automation and Management Platform for Your ELK Stack Deployment. Read more ▶

Image: Pharming explained: How attackers use fake websites to steal data

Pharming explained: How attackers use fake websites to steal data

A pharming attack aims to redirect victims’ web traffic away from their intended destination to a website controlled by threat actors to harvest information and spread malware. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Google enters zero-trust market with BeyondCorp Remote Access offering

Google enters zero-trust market with BeyondCorp Remote Access offering

Google makes its internal zero-trust access infrastructure available to anyone on a subscription basis as an alternative to VPNs. Read more ▶

 
 
Image: How to check your Windows network for vulnerabilities

How to check your Windows network for vulnerabilities

If you've made significant changes to your network to support remote workers, it's time to review what you've done to make sure everything is locked down. Read more ▶

Image: 8 video chat apps compared: Which is best for security?

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs? Read more ▶

Image: How Prudential measures its security culture to identify risk

How Prudential measures its security culture to identify risk

The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge. Read more ▶

Image: How to lock down Remote Desktop Protocol servers

How to lock down Remote Desktop Protocol servers

Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers. Read more ▶

Miscellaneous: Robin.io

Migrating from Cloud to Cloud-Native

Kubernetes Challenges and Opportunities. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com