CSO

May 18, 2020

CSO Daily

The day's top cybersecurity news and in-depth coverage

The CISO's guide to securely handling layoffs

Follow these 10 best practices to limit risks to your organization. Read more ▶

How to protect your network from web shell malware

Attackers are using web shells to mimic legitimate files on web servers and infect them with malware. Here’s how to prevent it. Read more ▶

Cisco and Palo Alto Networks appliances impacted by Kerberos authentication bypass

The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now.

4 key benefits of NOC/SOC integration and tips for making it work

Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.

White Paper | Panda Security

Avoiding APTs: Defending Your Critical Infrastructure

Today’s cybersecurity landscape is constantly evolving, with new attacks surfacing regularly, and known attacks growing in both scope and complexity. From ransomware to cryptojacking and beyond, hackers are continuously finding access with new tactics. One area that has seen a lot of growth recently is Advanced Persistent Threats (APTs).

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

5 risk management mistakes CISOs still make

Cybersecurity is now a board-level issue, but many organizations still struggle to get security risk management right.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701