Laden...
May 15, 2020
The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now. Read more â¶
Simplifying threat detection and response
6 ways attackers are exploiting the COVID-19 crisis
How IoT changes your threat model: 4 key considerations
Introducing the IDGÂ TECH(talk) Community
4 critical issues surrounding contact-tracing apps
Managing Third-party Risk in Times of Uncertainty
Ryuk ransomware explained: A targeted, devastatingly effective attack
4 key benefits of NOC/SOC integration and tips for making it work
The CSO guide to top security conferences, 2020
Join Bob Bragdon, Senior Vice President and Publisher of CSO, and Chris Smith, VP of Global Security Services, CenturyLink, as they explore these and other issues â and outline actionable advice for IT and security practitioners alike. Read more â¶
Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.
More IoT devices connected to your network increases your attack surface, lowers visibility to potential threats, and requires greater coordination between IT and OT.
Join the IDGÂ TECH(talk) Community, an exclusive online network where IT experts find resources to enhance their knowledge and career. Engage with peers on industry challenges, market trends, emerging technology, case studies, and more.
As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.
The world of risk management is undergoing big changes due to ripple effects stemming from the COVID-19 pandemic. Read more â¶
Ryuk ransomware attacks are targeted to the most vulnerable, most likely to pay companies and are often paired with other malware such as TrickBot.
Companies that have started the SOC/NOC integration process report improved security and operational efficiencies, but had to overcome technical and cultural challenges.
Tracking postponements, cancellations, and conferences gone virtual â CSO Onlineâs calendar of upcoming security conferences makes it easy to find the events that matter the most to you.
© 2024