CSO

CSO Daily

May 15, 2019

Image: The second Meltdown: New Intel CPU attacks leak secrets

The second Meltdown: New Intel CPU attacks leak secrets

Intel has done some mitigations for these vulnerabilities that can leak secrets from virtual machines, secure enclaves and kernel memory. Here's how the attacks work. Read more ▶

Your Must-Read Stories

•

How Microsoft builds empathy between its security and development teams

•

Beware social engineering reduction clauses in cybersecurity insurance policies

•

Cybersecurity professionals are no match for cyber-adversaries

•

Why GE consolidated its identity and access management infrastructure

•

200 million-record breach: Why collecting too much data raises risk

•

CSO50 2019: Seeding security in the cloud

eBook: S-Net Telcom

2019 SD-WAN Market Landscape

SD-WAN alleviates several of the technical, financial and operational constraints of its predecessor data networks. Benefits and opportunities abound with SD-WAN, but there are some critical differences compared to older technologies: how it is deployed and how it is managed. This Market Landscape report explores the primary deployment approaches and offers market insights to enterprises at all stages of SD-WAN adoption. Read more ▶

Image: How Microsoft builds empathy between its security and development teams

How Microsoft builds empathy between its security and development teams

Ongoing cross-training, threat information sharing, executive support and a strong threat modeling infrastructure helps the company's security and development staff work collaboratively. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Beware social engineering reduction clauses in cybersecurity insurance policies

Beware social engineering reduction clauses in cybersecurity insurance policies

Some cyber insurance policies will pay only a small fraction of damages if an attacker used social engineering. Here's how to estimate the risk. Read more ▶

 
 
Image: Cybersecurity professionals are no match for cyber-adversaries

Cybersecurity professionals are no match for cyber-adversaries

In the battle against hackers, cyber-adversaries have an advantage over cyber-defenders, new research from ESG and ISSA finds. Read more ▶

Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: 200 million-record breach: Why collecting too much data raises risk

200 million-record breach: Why collecting too much data raises risk

Avoid the siren song of big data and collect only what you need. This is the big takeaway from a 200-million record direct marketing list, including home address, telephone, religious affiliation and financial information now circulating on the grey market. Read more ▶

Image: CSO50 2019: Seeding security in the cloud

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

White Paper: Hyland Software

Content Services: Leveraging Cloud for Improved IT and Business Outcomes

Content is a fundamental asset of all organizations, but simply managing and storing this content is no longer sufficient. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].