The cybersecurity legislation agenda: 5 areas to watch Are zero-day exploits the new norm? CSO Update February 21, 2019 The cybersecurity legislation agenda: 5 areas to watch The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here's the list. Read more ▶ Your Must-Read Stories • Are zero-day exploits the new norm? • Review: SlashNext is like shooting phish in a barrel • How much does it cost to launch a cyberattack? • Top tools and resources for running a capture the flag competition • How to update Windows 10 for side channel vulnerability fixes • IoT botnets target enterprise video conferencing systems eGuide: SecureAuth Best Practice Guide to Strong Identity Access Management: Prevent and Contain Breaches - Without Impacting Users Read your guide to prevent breaches from attackers with stolen credentials and ways around 2FA. The more you know about users, the more confidently you can remove authentication disruptions. Read more ▶ Are zero-day exploits the new norm? Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more ▶ FROM OUR BUSINESS PARTNERS Empower your teams with Salesforce's productivity platform — get started for free Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more ▶ Review: SlashNext is like shooting phish in a barrel SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶ How much does it cost to launch a cyberattack? Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶ Top tools and resources for running a capture the flag competition Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more ▶ How to update Windows 10 for side channel vulnerability fixes Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more ▶ IoT botnets target enterprise video conferencing systems WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more ▶ White Paper: SecureAuth Making Passwordless Possible: How SecureAuth is eliminating passwords while improving security and user experience This paper explores how you can actually increase security and make users more productive by removing them. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.