CSO

CSO Daily

March 11, 2020

Image: New CPU attack technique can leak secrets from Intel SGX enclaves

New CPU attack technique can leak secrets from Intel SGX enclaves

The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown. Read more ▶

Your Must-Read Stories

•

How to prevent attackers from using Windows against you

•

Open-source options offer increased SOC tool interoperability

•

8 mobile security threats you should take seriously in 2020

•

How Visa built its own container security solution

•

Top cybersecurity facts, figures and statistics for 2020

•

RSA 2020: 7 trends and takeaways

White Paper: Atlassian

Four enterprise priorities and how Atlassian tools can help

It’s no secret that the global business landscape has shifted. With this shift, the technology that supports your business strategy is becoming more and more important. From the tools that you implement, to the practices that surround them, they all contribute to your success. Download our PDF and find out how you can choose and optimize the right technology to achieve your business goals. Read more ▶

Image: How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Open-source options offer increased SOC tool interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability. Read more ▶

 
 
Image: 8 mobile security threats you should take seriously in 2020

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues. Read more ▶

Image: How Visa built its own container security solution

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries. Read more ▶

Image: Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry. Read more ▶

Image: RSA 2020: 7 trends and takeaways

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk Read more ▶

Research/Infographic: Atlassian

How to scale IT and get ahead of the growth curve

Scaling effectively means anticipating demand, not reacting to it. By planning your IT landscape for the future you can manage growing pains before they happen. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com