CSO

CSO Update

July 30, 2019

Image: 6 API security lessons from the Venmo breach

6 API security lessons from the Venmo breach

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Your Must-Read Stories

•

Critical VxWorks flaws expose millions of devices to hacking

•

Stealing money in the digital age: The dark industry of trafficking financial data

•

What is a CASB? What you need to know before you buy

•

11 top DEF CON and Black Hat talks of all time

•

The biggest data breach fines, penalties and settlements so far

•

15 signs you've been hacked -- and how to fight back

Video/Webcast: FireMon

5 Steps to Keeping Firewall Rules Up-to-Date and Secure

Global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden with help from subject matter experts at FireMon. Read more ▶

Image: Critical VxWorks flaws expose millions of devices to hacking

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and medical equipment. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

 
 
Image: What is a CASB? What you need to know before you buy

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems. Read more ▶

Image: 11 top DEF CON and Black Hat talks of all time

11 top DEF CON and Black Hat talks of all time

Hacker summer camp in Vegas is almost upon us again. Here are some of the best talks of all time. Will this year's talks measure up to these legends? Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting. Read more ▶

Image: 15 signs you've been hacked -- and how to fight back

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked. Read more ▶

White Paper: FCN, Inc.

Adopting Hyper Converged Infrastructure Solutions for Government Agencies

Read this White Paper to learn how NetApp HCI, a complete turnkey VMware environment, offers compute and storage hardware and the VMware hypervisor. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.