CSO

CSO Daily

November 26, 2019

Image: Global threat groups pose new political and economic dangers

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts. Read more ▶

Your Must-Read Stories

•

Review: How NeuVector protects containers throughout their lifecycle

•

A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

•

The 5 CIS controls you should implement first

•

How a bank got hacked (a study in how not to secure your networks)

•

10 ways to kill your security career

•

24 best free security tools

White Paper: Box

IDC MarketScape is in, and Box is a Leader

Today, more and more companies are seeing the power of the cloud to accelerate and transform their business. And with the realization that the old way of doing things no longer works, we’ve reached a tipping point. Cloud-based tools have brought agility, scalability, and innovation that are not only changing content-driven processes; they’re fundamentally changing the entire business landscape. Read more ▶

Image: Review: How NeuVector protects containers throughout their lifecycle

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world. Read more ▶

 
 
Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: How a bank got hacked (a study in how not to secure your networks)

How a bank got hacked (a study in how not to secure your networks)

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more ▶

Image: 10 ways to kill your security career

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions. Read more ▶

Image: 24 best free security tools

24 best free security tools

Check out these 24 free, standout software tools that will make your daily security work easier. Read more ▶

eBook: PerimeterX

Beat Bad Bots

Read the eBook, "How to Beat Bad Bots" to discover the six must-haves for bot protection. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.