CSO

CSO Daily

February 12, 2020

Image: Cybersecurity spending trends, 2020

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities. Read more ▶

Your Must-Read Stories

•

Huawei, 5G and the UK: What is the real risk for enterprises?

•

How to fight hidden malware on Windows networks

•

8 steps to being (almost) completely anonymous online

•

The CIA triad: Definition, components and examples

•

More targeted, sophisticated and costly: What you need to know about ransomware in 2020

•

How to check your vulnerability to credential dumping

White Paper: Box

IDC MarketScape is in, and Box is a Leader

Today, more and more companies are seeing the power of the cloud to accelerate and transform their business. And with the realization that the old way of doing things no longer works, we’ve reached a tipping point. Cloud-based tools have brought agility, scalability, and innovation that are not only changing content-driven processes; they’re fundamentally changing the entire business landscape. Read more ▶

Image: Huawei, 5G and the UK: What is the real risk for enterprises?

Huawei, 5G and the UK: What is the real risk for enterprises?

Secret backdoors might not be the biggest worry when it comes to 5G. Here's what you need to know about security risks around Huawei and 5G in general. Read more ▶

Image: Get Microsoft Azure-savvy & supercharge your resume with this training.

DEALPOST

Get Microsoft Azure-savvy & supercharge your resume with this training.

These eleven beginner-friendly courses will introduce you to the platform and its most important features. Read more ▶

Image: How to fight hidden malware on Windows networks

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network. Read more ▶

 
 
Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

Image: The CIA triad: Definition, components and examples

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure. Read more ▶

Image: More targeted, sophisticated and costly: What you need to know about ransomware in 2020

More targeted, sophisticated and costly: What you need to know about ransomware in 2020

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶

Image: How to check your vulnerability to credential dumping

How to check your vulnerability to credential dumping

Use these techniques to see if attackers have harvested authentication credentials from your Windows network. Read more ▶

White Paper: Box

Box named a Leader in the Forrester New Wave™: SaaS Cloud Content Platforms

We're thrilled to be recognized by Forrester as a Leader in The Forrester New Wave™: Cloud Content Platforms – Multitenant SaaS, Q3 2019. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com