11 new state privacy and security laws explained: Is your business ready? New Spectre-like CPU vulnerability bypasses existing defenses CSO Update August 08, 2019 11 new state privacy and security laws explained: Is your business ready? States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more ▶ Your Must-Read Stories • New Spectre-like CPU vulnerability bypasses existing defenses • Know your Edge Chromium security options • Famous social engineering attacks: 12 crafty cons • 6 lessons from Venmo's lax approach to API security • How attackers identify your organization's weakest links • 12 tips for effectively presenting cybersecurity to the board eBook: Base2 Solutions Case Study Ebook: Stories of Digital Innovation Digital Innovation (DI) can provide meaningful impacts for businesses of all types – companies looking for a competitive edge need to embrace DI. Read more ▶ New Spectre-like CPU vulnerability bypasses existing defenses The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more ▶ DEALPOST There's finally a communication app tailormade for on-the-go teams. Try it free. This intuitive collaboration platform is made for teams that move. Read more ▶ Know your Edge Chromium security options Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more ▶ Famous social engineering attacks: 12 crafty cons This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶ 6 lessons from Venmo's lax approach to API security Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶ How attackers identify your organization's weakest links Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶ 12 tips for effectively presenting cybersecurity to the board Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶ Miscellaneous: Adobe Systems Inc. Forrester TEI Adobe Sign Cost savings and business benefits enabled by Adobe Sign. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.