CSO

CSO Daily

January 25, 2019

Image: 15 secure coding practices to use in digital identity

15 secure coding practices to use in digital identity

Secure coding of any application or service is important, but it is vital in systems that process personal data. Read more ▶

Your Must-Read Stories

•

Millions of financial records leaked from server not protected by password

•

Multi-vector attacks target cloud-hosted technologies

•

What is digital forensics? And how to land a job in this hot field

•

The three most important ways to defend against security threats

•

Review: GreatHorn offers a better way to secure enterprise email

•

Think you know malware? Catch up on the latest trends

White Paper: Zapproved, Inc

How to Guide: Establishing Process

In Start Here: A How-to Guide to Establishing an Ediscovery Process, we’ve given stage-by-stage advice about how to achieve real, measurable improvements in your ediscovery. We cover every step from legal holds to post-matter resolution, complete with best practices and a helpful checklist for reference. In short, this practical guide can help you create and implement an effective, modern ediscovery process. Read more ▶

Image: Millions of financial records leaked from server not protected by password

Millions of financial records leaked from server not protected by password

Another day, another massive leak blamed on failing to password-protect a server. This time it's sensitive financial data in an Elasticsearch database. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: Multi-vector attacks target cloud-hosted technologies

Multi-vector attacks target cloud-hosted technologies

Securonix report outlines the threat posed by automated multi-vector, multi-platform attacks against cloud infrastructure. Read more ▶

 
 
Image: What is digital forensics? And how to land a job in this hot field

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path. Read more ▶

Image: The three most important ways to defend against security threats

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read more ▶

Image: Review: GreatHorn offers a better way to secure enterprise email

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more ▶

Image: Think you know malware? Catch up on the latest trends

Think you know malware? Catch up on the latest trends

Malware is a blanket term for viruses, worms, trojans, and other harmful computer programs hackers use it to wreak destruction and gain access to sensitive information. Learn what malware does and how you can remove it—or prevent it. Read more ▶

Miscellaneous: LNS Research

The Changing Face of Manufacturing Presented By LNS Research

Download this Research Kit to understand how digital tech drives enterprise-wide performance and impacts powerful decisions. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].