CSO

CSO Update

March 12, 2020

Image: Credit card skimmers explained: How they work and how to protect yourself

Credit card skimmers explained: How they work and how to protect yourself

A card skimmer is a device designed to steal information stored on payment cards when consumers perform transactions at ATMs, gas pumps and other payment terminals. More recently, the use of the term has been extended to include malicious software or code that achieves the same goal on e-commerce websites. Read more ▶

Your Must-Read Stories

6 security metrics that matter – and 4 that don't

Deloitte: 8 things municipal governments can do about ransomware

Open-source options offer increased SOC tool interoperability

How to prevent attackers from using Windows against you

New CPU attack technique can leak secrets from Intel SGX enclaves

Making the case for hardware 2FA in the enterprise

eBook: AWS

Go long with machine learning

Discover how the NFL & AWS are using machine learning and artificial intelligence to transform how football is analyzed, played, coached, and experienced. NFL Next Gen Stats, powered by AWS, captures real-time location data, speed, and acceleration—for every player, on every play, and on every inch of the field. Read this eBook to see how the NFL uses machine learning to work smarter and create deeper, more engaging fan experiences. Read more ▶

Image: 6 security metrics that matter – and 4 that don't

6 security metrics that matter – and 4 that don't

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Deloitte: 8 things municipal governments can do about ransomware

Deloitte: 8 things municipal governments can do about ransomware

Deloitte researchers explain why state and local governments are favored for ransomware attacks and how they can protect themselves with limited resources. Read more ▶

 
 
Image: Open-source options offer increased SOC tool interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability. Read more ▶

Image: How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute. Read more ▶

Image: New CPU attack technique can leak secrets from Intel SGX enclaves

New CPU attack technique can leak secrets from Intel SGX enclaves

The Load Value Injection attack can bypass security boundaries and mitigations put in place for other CPU vulnerabilities such as Spectre and Meltdown. Read more ▶

Image: Making the case for hardware 2FA in the enterprise

Making the case for hardware 2FA in the enterprise

Hardware 2FA tokens are the best and cheapest defense against phishing and credential stuffing attacks, but there are some gotchas. Read more ▶

eBook: AWS

Automate Document Processing with AI

Download this eBook to learn how Amazon Textract "reads" documents as a person would, using artificial intelligence and extracts text, tables, forms, and other structured data. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com