CSO

CSO Update

January 06, 2019

Image: 6 reasons biometrics are bad authenticators (and 1 acceptable use)

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof. Read more ▶

Your Must Read Stories

•

6 reasons biometrics are bad authenticators (and 1 acceptable use)

•

2019 will be the year of cloud-based cybersecurity analytics/operations

•

Hacking skills on display at the 35th Chaos Communication Congress

•

Hacker posts ransom demand on Dublin's Luas tram system site

•

Harness the NIST CSF to boost your security and compliance

•

24 best free security tools

•

How security operations centers are adapting to the cloud era

White Paper: Microsoft

Transform your field service with IoT, AI, and mixed reality

Once considered a cost center, field service— including service requests, scheduling, resource assignment, and parts management—is becoming a profitable source of business intelligence and brand differentiation. The key to this transformation is connected field service technology. Read more ▶

Image: 2019 will be the year of cloud-based cybersecurity analytics/operations

2019 will be the year of cloud-based cybersecurity analytics/operations

Demand- and supply-side changes will move security information and event management (SIEM) from on premises to the public cloud. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Hacking skills on display at the 35th Chaos Communication Congress

Hacking skills on display at the 35th Chaos Communication Congress

35th Chaos Communication Congress had hackers spoofing a vein authentication system with a wax hand, showing off hardware wallet hacks, and outlining the first UEFI rootkit. Read more ▶

 
 
Image: Hacker posts ransom demand on Dublin's Luas tram system site

Hacker posts ransom demand on Dublin's Luas tram system site

The website for Dublin’s tram system Luas was hacked, with the hacker threatening to leak the company’s private data if the ransom was not paid within the next five days. Read more ▶

Image: Harness the NIST CSF to boost your security and compliance

Harness the NIST CSF to boost your security and compliance

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. Read more ▶

Image: 24 best free security tools

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier. Read more ▶

Image: How security operations centers are adapting to the cloud era

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data. Read more ▶

White Paper: Microsoft

5 innovative ways industry leaders modernize their field service

IoT-enabled devices are a reality in every industry, but nowhere is the growth of IoT more apparent than in field service. Businesses that harness this trend can generate greater efficiencies, improved levels of service, and new revenue streams. Read more ▶

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.