CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

September 14, 2020

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks. Read more ▶

Image: What Makes Intelligence Actionable

Solution Brief | NetEnrich

What Makes Intelligence Actionable

Learn the nuances of actionable intelligence and how to prioritize the correct threats.

Windows code-signing attacks explained (and how to defend against them)

Learn how code-signing attacks work and how to defend against them. It starts with patching.

Video/Webcast | Veeam Software Corporation

5 technologies for assured data recovery

Watch this webinar and demo to learn about 5 technologies that ensure you can recover data when you need to!

Common cloud security mistakes that put your data at risk

Yes, the cloud offers many security advantages over on-premises, especially for smaller organizations, but only if you avoid these mistakes around cloud configuration, monitoring and patching.

4 top vulnerabilities ransomware attackers exploited in 2020

As more employees work from home, attackers have more endpoints to target. These unpatched vulnerabilities in remote access tools and Windows makes their job easier.

Securing Microsoft Teams: The options are limited

The popular messaging and video conferencing platform comes with security and privacy risks. These are your limited native and third-party options for protecting users and data.

11 types of hackers and how they will harm you

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701