CSO

CSO Daily

December 02, 2019

Image: Flex streamlines app access for 20k suppliers with IAM overhaul

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. Read more ▶

Your Must-Read Stories

•

31 hardware and firmware vulnerabilities: A guide to the threats

•

What it takes to be an interim CISO

•

Data breached in translation

•

9 top SAST and DAST tools

•

Web payment card skimmers add anti-forensics capabilities

•

Can Security Onion replace your commercial IDS?

White Paper: PerimeterX

Five Major Bot Threats to Holiday E-commerce and How To Stop Them

The 2019 holiday shopping season is expected to have record losses due to malicious bot activity. Automated bot attacks make up more than 50% of traffic to retail sites, and are becoming increasingly sophisticated as they learn how to avoid detection. Read more ▶

Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards. Read more ▶

 
 
Image: Data breached in translation

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure. Read more ▶

Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: Web payment card skimmers add anti-forensics capabilities

Web payment card skimmers add anti-forensics capabilities

The newly discovered Pipka script can delete itself from a website after execution, making it very difficult to detect. Read more ▶

Image: Can Security Onion replace your commercial IDS?

Can Security Onion replace your commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it. Read more ▶

Case Study: ServiceNow Inc

Virgin Trains streamlines processes with ServiceNow to transform the rider experience

In this case study, explore how Virgin Trains delivered a digitized, automated, and personalized rail experience to their customers with ServiceNow. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.