CSO

CSO Daily

October 04, 2019

Image: Cobalt cybercrime group might be launching Magecart skimming attacks

Cobalt cybercrime group might be launching Magecart skimming attacks

Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars. Read more ▶

Your Must-Read Stories

•

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

•

How to protect and safely erase data on Windows devices

•

Introduction to HPE’s Consumption-based Cloud Solution

•

How to create an effective security policy (and 4 templates to get you started)

•

Deepfakes and synthetic identity: More reasons to worry about identity theft

•

8 ways your patch management policy is broken (and how to fix it)

White Paper: Ramp

Video Distribution Behind the Firewall

This whitepaper provides insight into why an eCDN is important and dives into each of the most common types of eCDNs—multicasting, video caching and peer-to-peer. Read more ▶

Image: Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: How to protect and safely erase data on Windows devices

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives. Read more ▶

 
 
Image: Introduction to HPE’s Consumption-based Cloud Solution

BrandPost Sponsored by HPE

Introduction to HPE’s Consumption-based Cloud Solution

A managed cloud solution for Amazon Web Services, Microsoft Azure & Azure Stack. Read more ▶

Image: How to create an effective security policy (and 4 templates to get you started)

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response. Read more ▶

Image: Deepfakes and synthetic identity: More reasons to worry about identity theft

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters? Read more ▶

Image: 8 ways your patch management policy is broken (and how to fix it)

8 ways your patch management policy is broken (and how to fix it)

These eight patching best practices mistakes get in the way of effective risk mitigation. Here's how to fix them. Read more ▶

Miscellaneous: ServiceNow Inc

ABERDEEN STUDY: Four Transformative Best Practices for Future-Ready Customer Service Experiences

Read the survey report and learn: · What makes an organization best in class? · How your service organization measures up · Four best practices to transform your service · What’s required to implement those practices? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.