CSO

CSO Update

November 07, 2019

Image: Defenders can discover phishing sites through web analytics IDs

Defenders can discover phishing sites through web analytics IDs

Many phishing websites are now using unique user IDs (UIDs), and that gives defenders a signal to detect phishing attacks before they do much damage. Read more ▶

Your Must-Read Stories

•

Top SAST and DAST tools that can fix app security problems before deployment

•

Boeing's poor information security posture threatens passenger safety, national security, researcher says

•

What CIOs want from CISOs: Collaboration and no finger pointing

•

5 keys to protect your supply chain from cyberattacks

•

How to disable LLMNR in Windows Server

•

The security staffing problem isn't going away. Now what?

White Paper: Jive Communications, Inc.

Raise Your Business to New Heights with a Cloud Phone System

Prevailing technology trends are driving businesses like yours to adopt services like cloud phone systems. Read more ▶

Image: Top SAST and DAST tools that can fix app security problems before deployment

Top SAST and DAST tools that can fix app security problems before deployment

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: Boeing's poor information security posture threatens passenger safety, national security, researcher says

Boeing's poor information security posture threatens passenger safety, national security, researcher says

The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees. Read more ▶

 
 
Image: What CIOs want from CISOs: Collaboration and no finger pointing

What CIOs want from CISOs: Collaboration and no finger pointing

Two CIOs explain how they view their relationships with the security function, and why CISOs need to collaborate closely with CIOs whether they report into them or not. Read more ▶

Image: 5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important. Read more ▶

Image: How to disable LLMNR in Windows Server

How to disable LLMNR in Windows Server

Link-Local Multicast Name Resolution is usually not needed in modern networks and leaves the door open to man-in-the-middle attacks. Here's how to shut it off. Read more ▶

Image: The security staffing problem isn't going away. Now what?

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more ▶

White Paper: Jive Communications, Inc.

The Hosted VoIP Buyer’s Guide

Jive Communications leads the Hosted VoIP industry in customer support and reliability. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.