The state of ransomware: More targeted, sophisticated and costly Presidential campaigns taking email security more seriously--not so much at the local level CSO Update February 11, 2020 The state of ransomware: More targeted, sophisticated and costly Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶ Your Must-Read Stories • Presidential campaigns taking email security more seriously--not so much at the local level • 8 top OSINT tools: Find sensitive public info before hackers do • Release the monkey! How Infection Monkey tests network security • Opinion - Why hacking must be addressed in digital privacy policymaking • Best antivirus software: 13 top tools • Back to basics: The CIA triad explained Video/Webcast: Logicalis & IBM Mapping Your Cloud Journey: Move to the Cloud The move to the cloud is on—but more traditional IT organizations with legacy technology have a complex set of challenges of their own. Read more ▶ Presidential campaigns taking email security more seriously--not so much at the local level DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing. Read more ▶ DEALPOST Get Microsoft Azure-savvy & supercharge your resume with this training. These eleven beginner-friendly courses will introduce you to the platform and its most important features. Read more ▶ 8 top OSINT tools: Find sensitive public info before hackers do Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶ Release the monkey! How Infection Monkey tests network security This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network. Read more ▶ Opinion - Why hacking must be addressed in digital privacy policymaking Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking. Read more ▶ Best antivirus software: 13 top tools These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability. Read more ▶ Back to basics: The CIA triad explained The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure. Read more ▶ Video/Webcast: Logicalis & IBM Mapping Your Cloud Journey: Operate and Optimize the Cloud The move to the cloud is well documented. But there's a dark side to cloud adoption: through 2020, 80% of organizations will overshoot their cloud. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your email preferences | Subscribe | Privacy Policy Learn more about Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com. © 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com