CSO

CSO Daily

October 01, 2019

Image: BEC attacks cost millions, losses doubling each year

BEC attacks cost millions, losses doubling each year

Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams. Read more ▶

Your Must-Read Stories

•

Voting machine security: What to look for and what to look out for

•

6 questions candidates should ask at every security job interview

•

How to migrate smartphone users to the Outlook app with Intune

•

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

•

The top 5 email encryption tools: More capable, better integrated

•

5 top cybersecurity masters degrees: Which is right for you?

White Paper: ReliaQuest

451 Research Report: Tackling the Visibility Gap in Information Security

451 Research recently published insights gathered from in-depth interviews with security leaders across 150 large enterprises to better understand the most critical challenges facing their teams. Read more ▶

Image: Voting machine security: What to look for and what to look out for

Voting machine security: What to look for and what to look out for

The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: 6 questions candidates should ask at every security job interview

6 questions candidates should ask at every security job interview

The cybersecurity skills shortage means security pros can be picky about where they work. Here's how to suss out bad employers. Read more ▶

 
 
Image: How to migrate smartphone users to the Outlook app with Intune

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook. Read more ▶

Image: Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own. Read more ▶

Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Image: 5 top cybersecurity masters degrees: Which is right for you?

5 top cybersecurity masters degrees: Which is right for you?

New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five. Read more ▶

White Paper: ReliaQuest

Application Logging Challenges in Information Security

Logging events from applications is an important process in cybersecurity. Whether it’s a custom-built application, or one hosted by a third-party company, logging and monitoring these applications is necessary to get full visibility into your environment. This type of logging doesn’t come without its share of challenges. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.