CSO

CSO Daily

March 26, 2019

Image: Why AI fuzzing may be the next big cybersecurity threat

Why AI fuzzing may be the next big cybersecurity threat

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals. Read more ▶

Your Must-Read Stories

•

How to report a data breach under GDPR

•

3 top multi-cloud security challenges, and how to build a strategy

•

Whip your information security into shape with ISO 27001

•

7 keys to a successful IT security career

•

8 cheap or free cybersecurity training resources

•

How to audit Windows Task Scheduler for cyber-attack activity

Miscellaneous: Idaptive

Next-Gen Access and Zero Trust webinar

Join Andras Cser, VP Principal Analyst, Forrester and Corey Williams, VP of Product Marketing and Strategy, Idaptive for a webinar covering how the Zero Trust Extended model and a Next-Gen Access platform, not only bolster an organization’s security posture but also improve end user experiences — all without sacrificing best-of-breed features. Read more ▶

Image: How to report a data breach under GDPR

How to report a data breach under GDPR

Data breach notification requirements are now mandatory and time-sensitive under GDPR. Here's what you need to report and who report it to. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: 3 top multi-cloud security challenges, and how to build a strategy

3 top multi-cloud security challenges, and how to build a strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security strategies. Read more ▶

 
 
Image: Whip your information security into shape with ISO 27001

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular information security standards around — and it works for any size business. Read more ▶

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Image: How to audit Windows Task Scheduler for cyber-attack activity

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks. Read more ▶

White Paper: Softchoice Corporation

Mobilize Enterpise Data with Citrix Sharefile on Microsoft Azure

Enterprise file sync and sharing services help mobile workers who use multiple devices, such as smartphones and tablets, to optimize their productivity. Click here to find out how. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].