CSO

CSO Update

November 21, 2019

Image: How a bank got hacked (a study in how not to secure your networks)

How a bank got hacked (a study in how not to secure your networks)

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more ▶

Your Must-Read Stories

•

Best new Windows 10 security features: Longer support, easier deployment

•

How to build a Windows disaster recovery toolkit

•

What is Shodan? The search engine for everything on the internet

•

10 ways to kill your security career

•

Web payment card skimmers add anti-forensics capabilities

•

Can Security Onion replace your commercial IDS?

Video/Webcast: Teradata

Moving Toward a Modern Analytics Architecture

As more data is moved into the cloud, the demands and expectations for using it has changed. It’s time to rethink your data analytics strategy. But what should a modern analytics architecture include? Read more ▶

Image: Best new Windows 10 security features: Longer support, easier deployment

Best new Windows 10 security features: Longer support, easier deployment

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1909 feature release. Read more ▶

Image: Learn how R is used in machine learning with this $29 training

DEALPOST

Learn how R is used in machine learning with this $29 training

The collection features 6 courses on how to use the R environment for machine learning and statistical analysis. Read more ▶

Image: How to build a Windows disaster recovery toolkit

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit. Read more ▶

 
 
Image: What is Shodan? The search engine for everything on the internet

What is Shodan? The search engine for everything on the internet

Defenders find this simple tool valuable for finding vulnerable devices attached to the web that need to be secured. Read more ▶

Image: 10 ways to kill your security career

10 ways to kill your security career

A breach won’t necessarily doom your career, but these missteps could hamper your professional ambitions. Read more ▶

Image: Web payment card skimmers add anti-forensics capabilities

Web payment card skimmers add anti-forensics capabilities

The newly discovered Pipka script can delete itself from a website after execution, making it very difficult to detect. Read more ▶

Image: Can Security Onion replace your commercial IDS?

Can Security Onion replace your commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it. Read more ▶

White Paper: Embotics Corporation

10 Signs That You Should Invest in a Cloud Management Platform

When confronted with cloud management challenges, many organizations operate on a reactive basis—developing ad hoc solutions to specific problems as they arise. And because of this, many IT cloud management programs are rife with duplicate capabilities, non-standard approaches, process inefficiencies, and the creation of a shadow IT organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.