CSO

CSO Daily

December 03, 2019

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

Your Must-Read Stories

•

How to evaluate a CASB

•

31 hardware and firmware vulnerabilities: A guide to the threats

•

What it takes to be an interim CISO

•

Flex streamlines app access for 20k suppliers with IAM overhaul

•

Data breached in translation

•

6 top OSINT tools: Find sensitive public info before hackers do

White Paper: Nexonia

The 5 Step Guide to Choosing an Expense Solution for Sage Intacct

In five steps, we’ll cover everything from mapping the needs of every user and department, to navigating solution vendors and product demonstrations. You’ll have the knowledge and tools to compare the myriad of solutions available with a clear path to selecting a T&E solution that connects seamlessly with Sage Intacct. Read more ▶

Image: How to evaluate a CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

 
 
Image: What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards. Read more ▶

Image: Flex streamlines app access for 20k suppliers with IAM overhaul

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. Read more ▶

Image: Data breached in translation

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read more ▶

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

White Paper: PerimeterX

Five Major Bot Threats to Holiday E-commerce and How To Stop Them

The 2019 holiday shopping season is expected to have record losses due to malicious bot activity. Automated bot attacks make up more than 50% of traffic to retail sites, and are becoming increasingly sophisticated as they learn how to avoid detection. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.