CSO

CSO Update

November 28, 2019

Image: Data breached in translation

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read more ▶

Your Must-Read Stories

•

Review: How NeuVector protects containers throughout their lifecycle

•

Has the quantum crypto break already happened?

•

Global threat groups pose new political and economic dangers

•

8 cheap or free cybersecurity training resources

•

How phishing works and how to prevent it

•

11 top cloud security threats

White Paper: Illumio

Decoupling Security from the Network: The Evolution of Segmentation

Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption. Read more ▶

Image: Review: How NeuVector protects containers throughout their lifecycle

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: Has the quantum crypto break already happened?

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe. Read more ▶

 
 
Image: Global threat groups pose new political and economic dangers

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Image: How phishing works and how to prevent it

How phishing works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

Image: 11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

White Paper: Illumio

How to Build a Micro-Segmentation Strategy

Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.