CSO

CSO Daily

December 17, 2019

Image: Are we running out of time to fix aviation cybersecurity?

Are we running out of time to fix aviation cybersecurity?

A new report from the Atlantic Council on aviation cybersecurity underscores the poor state of aviation security — and worse, how poorly understood the problem is within the industry. Read more ▶

Your Must-Read Stories

•

Common security purchasing mistakes and how to avoid them

•

"Penn Test" challenge helps infosec team think like attackers

•

Microsoft: these are the most cunning phishing attacks we spotted in 2019

•

How to secure your DNS traffic under Windows

•

9 top fuzzing tools: Finding the weirdest application errors

•

How Virgin Hyperloop One protects its most precious data

Miscellaneous: D2iQ

The Docker vs. Kubernetes vs. Apache Mesos Myth

Learn about Docker, Kubernetes and Mesos and how they each solve for different things and are rooted in very different contexts. Read more ▶

Image: Common security purchasing mistakes and how to avoid them

Common security purchasing mistakes and how to avoid them

Small- to medium-sized businesses (SMBs) often lack the resources and knowledge to properly vet cybersecurity solutions. Avoid poor decisions with these best practices. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image:

"Penn Test" challenge helps infosec team think like attackers

At Penn Medicine, gamifying security training builds skills, drives employee retention. Read more ▶

 
 
Image: Microsoft: these are the most cunning phishing attacks we spotted in 2019

Microsoft: these are the most cunning phishing attacks we spotted in 2019

Microsoft saw phishing attacks reach new heights of creativity and sophistication in 2019. Read more ▶

Image: How to secure your DNS traffic under Windows

How to secure your DNS traffic under Windows

DNS traffic is prone to snooping, and it’s often far too easy for attackers to hijack and change a company’s DNS settings. These simple steps will amp up your DNS protection. Read more ▶

Image: 9 top fuzzing tools: Finding the weirdest application errors

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit. Read more ▶

Image: How Virgin Hyperloop One protects its most precious data

How Virgin Hyperloop One protects its most precious data

VHO's high profile means its intellectual property is coveted by competitors, nation-states and curious hackers. Tightly controlled access is the key to protecting that data. Read more ▶

Miscellaneous: D2iQ

5 Critical Elements Needed for Your Cloud Native Transformation

For your organization to truly embrace a cloud native strategy, you need to think holistically beyond implementation to what happens on Day 2. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com