CSO

CSO Daily

August 05, 2019

Image: Looking for answers at Black Hat 2019: 5 important cybersecurity issues

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics. Read more ▶

Your Must-Read Stories

•

Review: How Nyotron Paranoid puts endpoint security worries to rest

•

Cryptojacking explained: How to prevent, detect, and recover from it

•

6 lessons from Venmo’s lax approach to API security

•

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

•

Top cyber security certifications: Who they're for, what they cost, and which you need

•

What is a zero day? A powerful but fragile weapon

White Paper: Dell & Dasher Technologies

The Business Value of Dell EMC Flash Storage

Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. The reality is, most organizations were not born digital but instead have legacy business processes, applications, and infrastructure that require modernization and automation. Read more ▶

Image: Review: How Nyotron Paranoid puts endpoint security worries to rest

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking explained: How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

 
 
Image: 6 lessons from Venmo’s lax approach to API security

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

Image: Top cyber security certifications: Who they're for, what they cost, and which you need

Top cyber security certifications: Who they're for, what they cost, and which you need

Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications. Read more ▶

Image: What is a zero day? A powerful but fragile weapon

What is a zero day? A powerful but fragile weapon

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].