CSO

CSO Daily

August 02, 2019

Image: 7 must-see talks at Black Hat and DEF CON 2019

7 must-see talks at Black Hat and DEF CON 2019

Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology. Read more ▶

Your Must-Read Stories

•

Top cyber security certifications: Who they're for, what they cost, and which you need

•

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

•

What is a CASB? What you need to know before you buy

•

Stealing money in the digital age: The dark industry of trafficking financial data

•

Critical VxWorks flaws expose millions of devices to hacking

•

6 lessons from Venmo’s lax approach to API security

eGuide: Amazon

Cloud Training

As companies transition to the cloud, the skills gap has never been greater. Sure, the training opportunities are out there—but what’s the best bang for your buck, and what are the most useful programs for your employees? This eGuide will give you a place to start. Read more ▶

Image: Top cyber security certifications: Who they're for, what they cost, and which you need

Top cyber security certifications: Who they're for, what they cost, and which you need

Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

 
 
Image: What is a CASB? What you need to know before you buy

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems. Read more ▶

Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

Image: Critical VxWorks flaws expose millions of devices to hacking

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and medical equipment. Read more ▶

Image: 6 lessons from Venmo’s lax approach to API security

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

White Paper: Code42

Economic Impact of Code42 Data Loss Protection

The Total Economic Impact of Code42 Data Loss Protection is a commissioned study by Forrester. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.