CSO

CSO Daily

March 27, 2019

Image: ASUS users fall victim to supply chain attack through backdoored update

ASUS users fall victim to supply chain attack through backdoored update

Attackers hijack ASUS's auto-update process to deliver malware. Preventing such attacks is difficult, but vendors and their customers can do more to mitigate the risk. Read more ▶

Your Must-Read Stories

•

How to time-sync Windows systems

•

6 secrets to CISO job longevity

•

Keys to a successful IT security career

•

24 best free security tools

•

Why AI fuzzing may be the next big cybersecurity threat

•

12 tips for effectively presenting cybersecurity to the board

Video/Webcast: Zscaler

Got SDP? Why It’s Time For Enterprises to Adopt One

Join us for an entertaining discussion around SDPs, including the benefits and challenges, with Manoj Apte, Chief Security Officer for Zscaler. Read more ▶

Image: How to time-sync Windows systems

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

 
 
Image: Keys to a successful IT security career

Keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Image: 24 best free security tools

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier. Read more ▶

Image: Why AI fuzzing may be the next big cybersecurity threat

Why AI fuzzing may be the next big cybersecurity threat

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

White Paper: Veeam Software Corporation

Disaster recovery platform for K-12 education environment

Nowadays, school districts rely on digital services for everything from teaching to administration. When things go wrong and they lose availability to their data, schools must be able to restore lost data and get their services back up fast—at a price they can afford. Here's how to do it Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.