CSO

May 20, 2020

CSO Daily

The day's top cybersecurity news and in-depth coverage

Executive order boots “foreign adversaries” from US electric grid over security concerns

White House action implies that China is "creating and exploiting" vulnerabilities in the US power grid. Experts say hardware backdoors have the potential for doing significant damage. Read more ▶

White Paper | Quest Software

Build Better Endpoint Security to Protect Your Entire Network

In this paper, we’ll take a closer look at how the KACE SMA can simplify these foundational steps to better endpoint security.

Cloud configuration drift leaves organizations open to attack, research finds

Undocumented cloud configuration changes, whether done by attackers or for legitimate business reasons, present a significant security threat.

How to protect Office 365 from coronavirus-themed threats

Microsoft's new Office 365 security defaults and OAuth 2.0 support will help meet new US government recommendations to thwart COVID-related attacks, Make sure they are properly implemented.

BrandPost Sponsored by Fortinet

Cybercriminals Are Exploiting the Rapid Change to Our Digital World

In the rush to make sure that workforces remain productive and ensure business continuity, things like security protocols may get overlooked, and criminals are looking to take advantage of any inadvertent security gaps.

4 tips for a successful cyber threat intelligence program

COVID-19 has opened the cyber-attack floodgates; defenders need strong cyber threat intllegence (CTI) analysis, operationalization and sharing. Here's how to get more from your CTI program.

Best new Windows 10 security features: Passwordless authentication, Chromium-based Edge support

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 2004 feature release.

How vishing attacks scam victims

Vishing (voice phishing) is a form of attack that attempts to trick victims into giving up sensitive personal information over the phone.

The CISO's guide to securely handling layoffs

Follow these 10 best practices to limit risks to your organization.

Ryuk ransomware explained: A targeted, devastatingly effective attack

Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701