CSO

CSO Daily

February 20, 2019

Image: How to update Windows 10 for side channel vulnerability fixes

How to update Windows 10 for side channel vulnerability fixes

Since Spectre and Meltdown were discovered in 2018, other side channel vulnerabilities have emerged. These are the mitigations to consider for each of them. Read more ▶

Your Must-Read Stories

•

How much does it cost to launch a cyberattack?

•

Review: SlashNext is like shooting phish in a barrel

•

Top tools and resources for running a capture the flag competition

•

2.7M recorded medical calls, audio files left unprotected on web

•

7 cheap or free cybersecurity training resources

•

10 essential steps to improve your security posture

eBook: LogicGate

Building a Cyber-Savvy Culture

In the past decade, IT Risk has gone from niche topic in data security circles to critical issue in the larger world of business and beyond. Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

Image: Empower your teams with Salesforce's productivity platform — get started for free

FROM OUR BUSINESS PARTNERS

Empower your teams with Salesforce's productivity platform — get started for free

Sign up for a free video to see how Quip can benefit your enterprise today, and get contacted for a personalized free trial of the platform. Read more ▶

Image: Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶

 
 
Image: Top tools and resources for running a capture the flag competition

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more ▶

Image: 2.7M recorded medical calls, audio files left unprotected on web

2.7M recorded medical calls, audio files left unprotected on web

Every call made to 1177 Swedish Healthcare Guide service since 2013, and answered by the subcontractor Medicall, was stored on an unprotected server. Read more ▶

Image: 7 cheap or free cybersecurity training resources

7 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Image: 10 essential steps to improve your security posture

10 essential steps to improve your security posture

A strong security posture takes more than having the right defenses in place, you also need to establish solid plans to ensure you react to any breach in the right way. Read more ▶

White Paper: Dell EMC and Intel®

The Role of Converged and Hyper-Converged Infrastructure in IT Transformation

IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds synonymous with digital transformation, but in actuality, IT Transformation is the set of enabling technologies, processes, and focus areas that make effective digital transformation possible. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.