CSO

CSO Update

June 09, 2019

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

Your Must-Read Stories

•

How do you secure the cloud? New data points a way

•

Rising to the cloud security challenge

•

Why unauthenticated SMS is a security risk

•

How to evaluate SOC-as-a-service providers

•

12 tips for effectively presenting cybersecurity to the board

•

New CISO appointments, May 2019

eBook: Splunk

The SOAR Buyer's Guide

Do you know what criteria you should consider when evaluating which SOAR platform to choose? This SOAR Buyer's Guide will help you. Read more ▶

Image: How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Rising to the cloud security challenge

Rising to the cloud security challenge

For many businesses, the fresh security risks posed by the rapid adoption of cloud technologies are driving deep security changes. For others, the cloud isn't the reason for the security overhaul but the fundamental enabler of it. Download this FREE digital issue of CSO magazine to learn more. Read more ▶

 
 
Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: New CISO appointments, May 2019

New CISO appointments, May 2019

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

White Paper: Zscaler

Secure Your Breakouts Without Breaking A Sweat

Chances are you are considering local internet breakouts with SD-WAN. But without security purpose-built for the task, the local breakouts break down—creating vulnerabilities. Zscaler can help. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].