CSO

CSO Update

February 27, 2020

Image: 8 mobile security threats you should take seriously in 2020

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues. Read more ▶

Your Must-Read Stories

A security guide for pandemic planning: 7 key steps

How to prevent scripting attacks in Microsoft Office

Lack of firmware validation for computer peripherals enables highly persistent attacks

11 penetration testing tools the pros use

APIs are becoming a major target for credential stuffing attacks

How to set up your network to prevent data loss

Miscellaneous: Databricks

2020 Gartner Magic Quadrant for Data Science and Machine Learning Platforms

Gartner names Databricks a Magic Quadrant Leader in Data Science and Machine Learning Platform. Read more ▶

Image: A security guide for pandemic planning: 7 key steps

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: How to prevent scripting attacks in Microsoft Office

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script. Read more ▶

 
 
Image: Lack of firmware validation for computer peripherals enables highly persistent attacks

Lack of firmware validation for computer peripherals enables highly persistent attacks

Vulnerabilities in unvalidated peripheral firmware such as WiFi adapters, cameras, and network interface controllers give attackers control over systems. Read more ▶

Image: 11 penetration testing tools the pros use

11 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Image: APIs are becoming a major target for credential stuffing attacks

APIs are becoming a major target for credential stuffing attacks

New research shows that attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable. Read more ▶

Image: How to set up your network to prevent data loss

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP). Read more ▶

Miscellaneous: CPP, a Hewlett Packard Enterprise Platinum Solution Provider

A Storage Solution That's Timeless and Nimble

Read this brochure to learn how a pay-as-you-go flash storage solution such as HPE Nimble Storage can help your organization eliminate unnecessary downtime, save on data storage management costs, and flexibly manage your workload needs as they evolve. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com