Laden...
May 14, 2020
As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls. Read more â¶
Simplifying threat detection and response
4 key benefits of NOC/SOC integration and tips for making it work
9 tips to detect and prevent web shell attacks on Windows networks
Episode 9: Donât be Batman: Why CISOs should embrace the sidekick role, Part 1
COVID-19 pandemic accelerates transformation in enterprise security
Ryuk ransomware explained: A targeted, devastatingly effective attack
How IoT changes your threat model: 4 key considerations
Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues â and outline actionable advice for IT and security practitioners alike. Read more â¶
Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.
Attackers often use web shells to mimic legitimate files and compromise web servers. These best practices will lower your risk.
Podcast Episode 9: Listen now as Akamai CISO Andy Ellis discusses the prevailing attitude in the infosec community that security pros are the good guys and the bad guys are, well, just about everyone else.
Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.
Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.
© 2024