CSO

CSO Daily

July 05, 2019

Image: Best Android antivirus? The top 13 tools

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features. Read more ▶

Your Must-Read Stories

•

The dirty dozen: 12 top cloud security threats

•

15 real-world phishing examples — and how to recognize them

•

What is corporate espionage? Inside the murky world of private spying

•

10 things you should know about dark web websites

•

How SQLi attacks work and how to prevent them

•

New CISO appointments, June 2019

Miscellaneous: Flexera

Webinar: Managing change in Java SE. So where are we?

Managing Change in Java SE: So Where Are We? WBNR Read more ▶

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 15 real-world phishing examples — and how to recognize them

15 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

 
 
Image: What is corporate espionage? Inside the murky world of private spying

What is corporate espionage? Inside the murky world of private spying

Companies gather intelligence on their rivals just like nation-states do. Sometimes its legal, but industrial espionage can easily slip over the line into criminality. Read more ▶

Image: 10 things you should know about dark web websites

10 things you should know about dark web websites

Catch a glimpse of what flourishes in the shadows of the internet. Read more ▶

Image: How SQLi attacks work and how to prevent them

How SQLi attacks work and how to prevent them

SQL injection is a type of attack that can give an adversary complete control over your web application database by inserting arbitrary SQL code into a database query. Read more ▶

Image: New CISO appointments, June 2019

New CISO appointments, June 2019

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

eBook: Flexera Software

New eBook: A Six-Step Framework for Your Multi-Cloud Strategy

6 Step Framework for Multi-Cloud Strategy Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.