CSO

CSO Daily

February 11, 2020

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

Your Must-Read Stories

•

Presidential campaigns taking email security more seriously--not so much at the local level

•

The state of ransomware: More targeted, sophisticated and costly

•

Release the monkey! How Infection Monkey tests network security

•

Opinion - Why hacking must be addressed in digital privacy policymaking

•

8 top OSINT tools: Find sensitive public info before hackers do

•

Back to basics: The CIA triad explained

Video/Webcast: Logicalis & IBM

Mapping Your Cloud Journey: Move to the Cloud

The move to the cloud is on—but more traditional IT organizations with legacy technology have a complex set of challenges of their own. Read more ▶

Image: Presidential campaigns taking email security more seriously--not so much at the local level

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing. Read more ▶

Image: Get Microsoft Azure-savvy & supercharge your resume with this training.

DEALPOST

Get Microsoft Azure-savvy & supercharge your resume with this training.

These eleven beginner-friendly courses will introduce you to the platform and its most important features. Read more ▶

Image: The state of ransomware: More targeted, sophisticated and costly

The state of ransomware: More targeted, sophisticated and costly

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶

 
 
Image: Release the monkey! How Infection Monkey tests network security

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network. Read more ▶

Image: Opinion - Why hacking must be addressed in digital privacy policymaking

Opinion - Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking. Read more ▶

Image: 8 top OSINT tools: Find sensitive public info before hackers do

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: Back to basics: The CIA triad explained

Back to basics: The CIA triad explained

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure. Read more ▶

Video/Webcast: Logicalis & IBM

Mapping Your Cloud Journey: Operate and Optimize the Cloud

The move to the cloud is well documented. But there’s a dark side to cloud adoption: through 2020, 80% of organizations will overshoot their cloud. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com