CSO

CSO Update

February 21, 2019

Image: The cybersecurity legislation agenda: 5 areas to watch

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here's the list. Read more ▶

Your Must-Read Stories

Are zero-day exploits the new norm?

Review: SlashNext is like shooting phish in a barrel

How much does it cost to launch a cyberattack?

Top tools and resources for running a capture the flag competition

How to update Windows 10 for side channel vulnerability fixes

IoT botnets target enterprise video conferencing systems

eGuide: SecureAuth

Best Practice Guide to Strong Identity Access Management: Prevent and Contain Breaches - Without Impacting Users

Read your guide to prevent breaches from attackers with stolen credentials and ways around 2FA. The more you know about users, the more confidently you can remove authentication disruptions. Read more ▶

Image: Are zero-day exploits the new norm?

Are zero-day exploits the new norm?

Research from Microsoft's Matt Miller shows that every actively exploited Windows vulnerability in 2017 was first done using a zero-day attack. Other research shows this trend extends across the IT landscape. Read more ▶

Image: Empower your teams with Salesforce's productivity platform — get started for free

FROM OUR BUSINESS PARTNERS

Empower your teams with Salesforce's productivity platform — get started for free

Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more ▶

Image: Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶

 
 
Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

Image: Top tools and resources for running a capture the flag competition

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more ▶

Image: How to update Windows 10 for side channel vulnerability fixes

How to update Windows 10 for side channel vulnerability fixes

Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more ▶

Image: IoT botnets target enterprise video conferencing systems

IoT botnets target enterprise video conferencing systems

WootCloud researchers have discovered a trio of IoT botnets based on Mirai that exploit Polycom video conferencing systems. Polycom has issued an advisory and best practices for mitigating the risk. Read more ▶

White Paper: SecureAuth

Making Passwordless Possible: How SecureAuth is eliminating passwords while improving security and user experience

This paper explores how you can actually increase security and make users more productive by removing them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.