CSO

CSO Update

October 08, 2019

Image: 7 ways 5G mobile networks will change IoT security, and how to prepare

7 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these seven areas before you deploy your own. Read more ▶

Your Must-Read Stories

•

Zero-day vulnerability gives attackers full control of Android phones

•

Justice Department takes another run at encryption backdoors with ‘lawful access’

•

Best antivirus software: 12 top tools

•

Directory traversal explained: Definition, examples and prevention

•

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

•

8 ways your patch management policy is broken (and how to fix it)

Miscellaneous: High Performance Technologies, a Hewlett Packard Enterprise Platinum Partner

Realize the Full Value of Cloud-Native IT

Read the blueprint to learn how businesses leverage hybrid cloud solutions like HPE SimpliVity, powered by Intel® Xeon® Scalable processors, and HPE Pointnext services to realize the full value of cloud-native IT. Read more ▶

Image: Zero-day vulnerability gives attackers full control of Android phones

Zero-day vulnerability gives attackers full control of Android phones

Attackers are reportedly exploiting an unpatched vulnerability to take control of Android devices and potentially deliver spyware. The flaw affects phones models from multiple manufacturers including Google, Samsung, Huawei, LG and Xiaomi. Read more ▶

Image: Learn how to invest & save for your future with GoBankingRates.com

DEALPOST

Learn how to invest & save for your future with GoBankingRates.com

Read more ▶

Image: Justice Department takes another run at encryption backdoors with ‘lawful access’

Justice Department takes another run at encryption backdoors with ‘lawful access’

Law enforcement officials and experts on the distribution of child pornography gathered on Friday to make the emotional, if not technological, case that tech companies should open up their encryption schemes to police investigating crimes. Read more ▶

 
 
Image: Best antivirus software: 12 top tools

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability. Read more ▶

Image: Directory traversal explained: Definition, examples and prevention

Directory traversal explained: Definition, examples and prevention

In a path traversal attack, also known as directory traversal, an attacker enters information in a web form, URL address line, or another input method that gives them access to a file or directory that they shouldn't have access to. Jira is just the most recent company to expose its customers via a path traversal vulnerability. This risk is easily avoidable, but developers keep making the same mistake. Read more ▶

Image: Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain. Read more ▶

Image: 8 ways your patch management policy is broken (and how to fix it)

8 ways your patch management policy is broken (and how to fix it)

These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them. Read more ▶

White Paper: Atlassian

Tips to make a lean, mean ITSM machine

Agile IT teams are more adaptable to changing needs, increase velocity when delivering new technology, and improvise when faced with obstacles. These teams also align with the business needs and strategy as opposed to just completing tickets and delivering on SLAs. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.