CSO

CSO Daily

October 02, 2019

Image: Deepfakes and synthetic identity: More reasons to worry about identity theft

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters? Read more ▶

Your Must-Read Stories

•

How to protect and safely erase data on Windows devices

•

Business email compromise attacks cost millions, losses doubling each year

•

How Hybrid Cloud Simplifies Data Sovereignty Challenges

•

Voting machine security: What to look for and what to look out for

•

Marriott data breach FAQ: How did it happen and what was the impact?

•

5 top cybersecurity masters degrees: Which is right for you?

Video/Webcast: Netscout Systems Inc

DDoS: Trends, Tips and Tactics

In this webcast, sponsored by Netscout, join Eric Vanderburg, Vice President, Cybersecurity, TCDI, for an overview of the DDoS landscape. Listeners will learn tips and best practices to prevent falling victim to these crippling attacks. Read more ▶

Image: How to protect and safely erase data on Windows devices

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Business email compromise attacks cost millions, losses doubling each year

Business email compromise attacks cost millions, losses doubling each year

Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams. Read more ▶

 
 
Image: How Hybrid Cloud Simplifies Data Sovereignty Challenges

BrandPost Sponsored by HPE

How Hybrid Cloud Simplifies Data Sovereignty Challenges

Read more ▶

Image: Voting machine security: What to look for and what to look out for

Voting machine security: What to look for and what to look out for

The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely. Read more ▶

Image: Marriott data breach FAQ: How did it happen and what was the impact?

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers. Many of the details remain undisclosed, but this cyberattack is a cautionary tale about IT security, mergers and acquisitions, and Chinese espionage. Read more ▶

Image: 5 top cybersecurity masters degrees: Which is right for you?

5 top cybersecurity masters degrees: Which is right for you?

New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five. Read more ▶

Miscellaneous: Veeam Software Corporation

The Business Value of High Availability Storage Environments from HPE and Veeam

It’s no secret that well-crafted and reliable data protection infrastructures are essential to the competitiveness of businesses. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.