CSO

May 29, 2020

CSO Daily

The day's top cybersecurity news and in-depth coverage

PKI explained: How it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications. Read more ▶

eBook | Proofpoint Inc

The Top 10 BEC Scams

Read this e-book to learn Proofpoint's approach to keep your email accounts and data safe.

Cyber LEAP Act aims for innovations through Cybersecurity Grand Challenges

New bill seeks to set up competitions across the US to spur security breakthroughs.

What you need to know about the Windows PrintDemon vulnerability

Microsoft has finally patched the decades-old Windows PrintDemon vulnerability, but exploitable devices might still be on your network.

Video: How attackers exploit the COVID crisis to compromise your network

Targeted phishing attempts and updated malware are creating havoc for Windows admins in a hard time. Here are some tips to minimize the damage.

5 examples of security theater and how to spot them

Security theater is a term coined by Bruce Schneier to describe security measures that satisfy our emotional need to take action, but don’t actually improve security. Rooting these out can save considerable time and money -- and make your organization safer.

Miscellaneous | Veracode

State of Software Security

Read the report to gain valuable perspective on the state of software security today.

4 ways edge computing changes your threat model

Edge computing provides more opportunities for attackers to access devices--and your network--remotely and physically. These are the risks you need to consider.

How to use Microsoft Sysmon, Azure Sentinel to log security events

Microsoft's Sysmon and Azure Sentinel are easy and inexpensive ways to log events on your network. Here's how to get started with them.

Use of cloud collaboration tools surges and so do attacks

Some industries have seen increases in cloud-related threat events rise as much as 1,350% since the COVID-19 crisis began.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701