CSO

CSO Daily

May 13, 2019

Image: New Intel firmware boot verification bypass enables low-level backdoors

New Intel firmware boot verification bypass enables low-level backdoors

By replacing a PC's SPI flash chip with one that contains rogue code, an attacker can can gain full, persistent access. Read more ▶

Your Must-Read Stories

•

Why GE consolidated its identity and access management infrastructure

•

How (and why) to build digital trust

•

Shared SIEM helps 3 UK local governments avoid outsourcing security

•

How to outwit attackers using two Windows registry settings

•

How Akamai implemented a zero-trust model

•

Is the cybersecurity skills shortage getting worse?

White Paper: Microsoft

AI in Government Playlist

In recent years, local, city, regional and national governments across the world have quietly launched pilot schemes to test emerging applications of artificial intelligence (AI), to an extent that demonstrates no less enthusiasm for the technology than that apparent in the private sector Read more ▶

Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How (and why) to build digital trust

How (and why) to build digital trust

Earning customers' trust translates to better customer acquisition, greater customer loyalty and more revenue. Download this FREE digital issue of CSO magazine to learn how to do it. Read more ▶

 
 
Image: Shared SIEM helps 3 UK local governments avoid outsourcing security

Shared SIEM helps 3 UK local governments avoid outsourcing security

A single SIEM serves three UK councils, allowing for solution consolidation that saves costs while improving efficiency and regulatory compliance. Read more ▶

Image: How to outwit attackers using two Windows registry settings

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access. Read more ▶

Image: How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement. Read more ▶

Image: Is the cybersecurity skills shortage getting worse?

Is the cybersecurity skills shortage getting worse?

New research indicates that things are not improving for filling the demand for cybersecurity skills. The ramifications are widespread. Read more ▶

eBook: Microsoft

Containerize Your Apps with Docker and Kubernetes

If you are a developer, system administrator, or DevOps engineer who wants to use Docker and Kubernetes to run your mission-critical applications scalable, securely, and highly available on-prem or in the cloud, then this book is for you. In order to learn from this book, you should have some basic Linux/Unix skills such as installing packages, editing files, managing services, and so on. If you have some basic virtualization experience that would be an added advantage. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].