CSO

CSO Daily

March 29, 2019

Image: 9 top hacker movies and TV shows of all time

9 top hacker movies and TV shows of all time

Movies and TV shows have long influenced how lawmakers and society think about information security. We all have our personal favorite we're obsessed with. What's yours? Read more ▶

Your Must-Read Stories

•

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

•

How to hack a smartcard to gain privileged access

•

Whip your information security into shape with ISO 27001

•

The new CISO's playbook: 5 rules to follow

•

The best password advice right now (Hint: It's not the NIST guidelines)

•

12 tips for effectively presenting cybersecurity to the board

White Paper: BAE Systems

The Intelligence Network: Safeguarding Society in The Digital World

The Intelligence Network is a community of 1,200 like minded global security professionals and industry influencers. We’re committed to creating a safer society in the digital age. Read more ▶

Image: APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

APT group Elfin switches from data destruction to data stealing via WinRAR vulnerability

Iranian-linked hacker group switches techniques from Shamoon wiper attacks to WinRAR exploits. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: How to hack a smartcard to gain privileged access

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack. Read more ▶

 
 
Image: Whip your information security into shape with ISO 27001

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular information security standards around — and it works for any size business. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Video/Webcast: Sungard & AWS

2019 IT New Year Resolutions

The utilization of data and analytics applications to identify critical findings can provide an organization with competitive and operational advantage. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].