CSO

CSO Daily

April 26, 2019

Image: Best Android antivirus? The top 13 tools

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features. Read more ▶

Your Must-Read Stories

•

12 tips for effectively presenting cybersecurity to the board

•

Microsoft Office now the most targeted platform, as browser security improves

•

What is a side channel attack? How these end-runs around encryption put everyone at risk

•

Assume breach is for losers: These steps will stop data breaches

•

The best password advice right now (Hint: It's not the NIST guidelines)

•

Navigating the AI hype in security: 3 dos and 2 don'ts

eBook: Veeam Software Corporation

Data Protection by the Numbers

In this book, we look at each of the three data protection languages to help you empathize, communicate and collaborate with various teams within your organization. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Microsoft Office now the most targeted platform, as browser security improves

Microsoft Office now the most targeted platform, as browser security improves

The number of attacks carried out using the popular suite has increased in the past two years, Kaspersky Lab researchers say. Read more ▶

 
 
Image: What is a side channel attack? How these end-runs around encryption put everyone at risk

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more ▶

Image: Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

Yes, you do need to be prepared should your organization be breached, but countering social engineering, patching, multi-factor authentication and a solid backup plan will keep them from happening. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: Navigating the AI hype in security: 3 dos and 2 don'ts

Navigating the AI hype in security: 3 dos and 2 don'ts

“Very few things that advertise AI have the goods under the hood. I think what people are touting as innovative AI is still very basic, and we can go a lot further.” — Rick Grinnell, founder and managing partner, Glasswing Ventures Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.