CSO

CSO Daily

April 10, 2019

Image: Cybercrime groups borrowing APT techniques: What you need to know now

Cybercrime groups borrowing APT techniques: What you need to know now

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more ▶

Your Must-Read Stories

•

5 ways to curb cybersecurity burnout

•

CSO50 2019: Seeding security in the cloud

•

Inside the 2014 hack of a Saudi embassy

•

The 6 biggest ransomware attacks of the last 5 years

•

How and when to set Windows logging to UTC time

•

Security technologies that provide the most savings

White Paper: GridGain Systems

A Roadmap for In-Memory Computing: Current and Emerging Use Cases

The in-memory computing revolution is far from over, as demand continues to spur further innovation in in-memory computing technologies. Read more ▶

Image: 5 ways to curb cybersecurity burnout

5 ways to curb cybersecurity burnout

91% of CISOs suffer ‘moderate or high’ levels of stress. Here are some ways to help. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: CSO50 2019: Seeding security in the cloud

CSO50 2019: Seeding security in the cloud

CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: Inside the 2014 hack of a Saudi embassy

Inside the 2014 hack of a Saudi embassy

According to documents seen by CSO, an unknown attacker took control of the official email account of the Saudi embassy in The Netherlands and demanded a ransom of $50 million for ISIS. Read more ▶

Image: The 6 biggest ransomware attacks of the last 5 years

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis. Read more ▶

Image: How and when to set Windows logging to UTC time

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more ▶

Image: Security technologies that provide the most savings

Security technologies that provide the most savings

A new report from Accenture and the Ponemon Institute quantifies which cybersecurity technologies provide the most value to an organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.