CSO

CSO Daily

September 20, 2019

Image: 10 signs you're being socially engineered

10 signs you're being socially engineered

Scammers will try to trick you and your organization's users into giving up credentials or other sensitive date. Be skeptical if you see any of these signs. Read more ▶

Your Must-Read Stories

•

What is OAuth? How the open authorization framework works

•

Secrets of latest Smominru botnet variant revealed in new attack

•

Misconfigured WS-Discovery in devices enable massive DDoS amplification

•

How to detect and halt credential theft via Windows WDigest

•

Review: Blue Hexagon may make you rethink perimeter security

•

6 questions candidates should ask at every security job interview

Miscellaneous: Open Text

Compliant Application Decommissioning Reducing Costs & Risks

More than ever, there is a need for FSIs to enhance and modernize their application infrastructure, but they face data integrity and compliance challenges due to legacy applications that contain valuable, regulated data and content. This extremely useful information must be retained, given new life providing new context, delivering additional value and enabling reuse. The legacy applications, which may be decades old, are a cost and a risk burden to the organization. Read more ▶

Image: What is OAuth? How the open authorization framework works

What is OAuth? How the open authorization framework works

OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Secrets of latest Smominru botnet variant revealed in new attack

Secrets of latest Smominru botnet variant revealed in new attack

Researchers gained access to a Smominru command-and-control server to get details on compromised devices and scope of the attack. Read more ▶

 
 
Image: Misconfigured WS-Discovery in devices enable massive DDoS amplification

Misconfigured WS-Discovery in devices enable massive DDoS amplification

Researchers were able to achieve amplification rates of up to 15,300%. Some mitigations are possible. Read more ▶

Image: How to detect and halt credential theft via Windows WDigest

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them. Read more ▶

Image: Review: Blue Hexagon may make you rethink perimeter security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting. Read more ▶

Image: 6 questions candidates should ask at every security job interview

6 questions candidates should ask at every security job interview

The cybersecurity skills shortage means security pros can be picky about where they work. Here's how to suss out bad employers. Read more ▶

Video/Webcast: Hitachi Vantara

Using Data as Your Digital Differentiator

Digitally transforming? Today’s forward-looking CIO has an opportunity to use data as your business differentiator. It’s simple: Good data leads to good results. Mediocre data leads to mediocre results. And bad data leads to bad results. Join us as we explore this topic with experts from Hitachi Vantara and ZK Research. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.