CSO

CSO Daily

August 07, 2019

Image: New Spectre-like CPU vulnerability bypasses existing defenses

New Spectre-like CPU vulnerability bypasses existing defenses

The SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses. Microsoft and Intel have coordinated on a mitigation. Read more ▶

Your Must-Read Stories

•

Know your Edge Chromium security options

•

Review: How Nyotron Paranoid puts endpoint security worries to rest

•

Famous social engineering attacks: 12 crafty cons

•

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

•

What is a computer worm? How this self-spreading malware wreaks havoc

•

Cryptojacking explained: How to prevent, detect, and recover from it

White Paper: Dell EMC and Intel®

Get Rid of Database Workload Silos: Dell EMC SC5020 vs. HPE Nimble

In this whitepaper, Principled Technologies tested the All-Flash Dell EMC SC5020 array and the HPE Nimble Storage AF5000 All-Flash array to see how well each performed while handling two workloads at once. Find out which solution delivered stronger performance and learn more about the importance of eliminating database workload silos. Download this paper from Dell EMC and Intel® now. Read more ▶

Image: Know your Edge Chromium security options

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Review: How Nyotron Paranoid puts endpoint security worries to rest

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious. Read more ▶

 
 
Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: Looking for answers at Black Hat 2019: 5 important cybersecurity issues

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics. Read more ▶

Image: What is a computer worm? How this self-spreading malware wreaks havoc

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer. Read more ▶

Image: Cryptojacking explained: How to prevent, detect, and recover from it

Cryptojacking explained: How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

White Paper: Dell EMC and Intel®

Maximize Your Storage Capacity with the Dell EMC Unity 550F All-Flash Array

Taking into account time and budgetary constraints, most organizations can’t afford to make mistakes about where and how they allocate resources for storage. This means storage solutions must be sourced and operate efficiently, as well as eliminate the top two challenges many IT leaders cite as hindrances to their infrastructure: aging equipment and inadequate storage capacity. Download this white paper from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].