CSO

CSO Daily

April 03, 2020

Image: New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

New coronavirus-era surveillance and biometric systems pose logistical, privacy problems

Governments and companies are using biometrics and geolocation to identify and track potential coronavirus victims in the name of public safety. Read more ▶

Your Must-Read Stories

•

What is WireGuard? Secure, simple VPN now part of Linux

•

Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

•

12 top IDS/IPS tools

•

Bug bounty platforms buy researcher silence, violate labor laws, critics say

•

3 ways COVID-19 is changing CISO priorities

•

Best antivirus software: 13 top tools

Miscellaneous: Insight Enterprises

A confident transition to cloud-based Disaster Recovery (DR)

This brief explains how a Microsoft Azure BC/DR Envisioning Session prepares businesses to adopt a successful cloud strategy. Read more ▶

Image: What is WireGuard? Secure, simple VPN now part of Linux

What is WireGuard? Secure, simple VPN now part of Linux

The WireGuard VPN offers better performance and a simpler, effective approach to cryptography, and now it's built into Linux 5.6. Is it ready for the enterprise? Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

Weakness in Zoom for macOS allows local attackers to hijack camera and microphone

Zoom's use of insecure system APIs allow attackers to elevate privileges as well. Read more ▶

 
 
Image: 12 top IDS/IPS tools

12 top IDS/IPS tools

An intrusion detection or prevention system can mean the difference between a safe network and a nasty breach. We've rounded up some of the best and most popular IDS/IPS products on the market. Read more ▶

Image: Bug bounty platforms buy researcher silence, violate labor laws, critics say

Bug bounty platforms buy researcher silence, violate labor laws, critics say

The promise of crowdsourced cybersecurity, fueled by "millions of hackers," turns out to be a pipe dream, despite high-octane marketing from the bug bounty platforms. Read more ▶

Image: 3 ways COVID-19 is changing CISO priorities

3 ways COVID-19 is changing CISO priorities

The scramble to enable remote workers changes security strategies, priorities, and workflows for 2020. Read more ▶

Image: Best antivirus software: 13 top tools

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability. Read more ▶

Miscellaneous: Insight Enterprises

Adopting an effective strategy for Disaster Recovery (DR)

This infographic looks at common downtime concerns and the benefits of deploying Microsoft Azure for effective DR. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com