CSO

CSO Daily

June 07, 2019

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

Your Must-Read Stories

•

How do you secure the cloud? New data points a way

•

Security executives on the move and in the news

•

5 ways compliance hurts security

•

How to spot a scam: 14 red flags to watch for

•

28 DevSecOps tools for baking security into the development process

•

8 cheap or free cybersecurity training resources

eBook: IBM

Definitive Guide to Enterprise Video

Since enterprise video use is growing, organizations are investing in solutions to meet these needs. By utilizing high-quality content and choosing the best platform for the job, companies can find success in video, and reap all of its benefits such as unifying employees internally, as well as increasing overall engagement. Read more ▶

Image: How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Security executives on the move and in the news

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

 
 
Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

Image: How to spot a scam: 14 red flags to watch for

How to spot a scam: 14 red flags to watch for

Does your security awareness training program help your employees learn when someone is trying to scam them? Read more ▶

Image: 28 DevSecOps tools for baking security into the development process

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Video/Webcast: Forcepoint LLC

The State of the CASB Market

In this webcast, CEO and Osterman Research founder Mike Osterman will share the results of his survey on how organizations are using, or planning to implement, CASB solutions. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.