CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 27, 2020

The Windows Bad Neighbor vulnerability explained — and how to protect your network

Attackers could use the Windows Bad Neighbor vulnerability to perform remote code execution or create buffer overflows. Patches and workarounds are available. Read more ▶

Image: Sponsored by Darktrace: Surge in spear phishing attacks on remote workers.

Sponsored by Darktrace: Surge in spear phishing attacks on remote workers.

Email attacks are getting more sophisticated, impersonating your colleagues and trusted contacts. Cyber AI can tell friend from foe, stopping the most convincing malicious emails in their tracks.

CISM certification guide: Requirements, prerequisites, and cost

Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.

CSO50 Virtual Conference

Enlightening and inspiring sessions. Winning projects and initiatives featured in our information-packed, TED-like format of 18-minute sessions cover topics such as: access and identity management, critical infrastructure, new best practices for hiring and career development, #data loss prevention and recovery, managing third-party #risk, #security awareness and training. Attend November 17-19 and learn more. Register now.

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat.

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701