CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

June 09, 2020

New cybersecurity recommendations for US government target IoT, social media

The COVID-19 pandemic spurs the Cyberspace Solarium Commission policy initiative to issue a set of four security recommendations for the federal government in the wake of the crisis. Read more ▶

White Paper | Veracode

Veracode Static Analysis: The Right Scan, At the Right Time, in the Right Place

Software development is integral for an organization looking to keep up with market trends, remain competitive, and disrupt markets. While the world is innovating through software, all software introduces risk. Most applications are not built with security in mind, making them a top target for security breaches. Despite years of access to security testing tools, 83 percent of applications have at least one security flaw on their initial scan, and two out of three applications fail to pass tests based on the OWASP Top 10 and SANS 25.

Why COVID-19 will change identity management forever

Large job losses, more people working from home, and an increased use of freelancers and consultants are forcing companies to rethink their access control models.

10 things you should know about XDR

An initiative more than a technology, XDR seeks to simplify and unify security technologies to make the whole greater than the sum of its parts.

Video: Why attackers can still exploit a MS Office vulnerability patched in 2012

Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours?

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.

eGuide | Rangeforce, Inc

A Market Guide to Simulation-Based Cybersecurity Training

Learn why on-demand simulation-based cybersecurity training is essential for security teams in today’s threat environment.

Should you deploy a TLS 1.3 middlebox?

Organizations moving to the TLS 1.3 protocol must decide whether to deploy middleboxes that intercept network traffic for greater visibility, but doing so presents security and regulatory risks.

8 ways to get more life out of an old SIEM

Can't update your old security information and event management system now? Use this advice to maintain its effectiveness.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701