CSO

CSO Daily

December 09, 2019

Image: How a nuclear plant got hacked

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided. Read more ▶

Your Must-Read Stories

•

9 top fuzzing tools: Finding the weirdest application errors

•

Hardware and firmware vulnerabilities: A guide to the threats

•

8 common pen testing mistakes and how to avoid them

•

How to evaluate a CASB

•

4 authentication use cases: Which protocol to use?

•

How to manage Windows 10 1903 and 1909 security updates

Miscellaneous: R Systems & AWS

Cloud Roadmap Assesment for AWS

R Systems, an Advanced-tier AWS Partner, and a global leader in AI/Analytics services, is uniquely qualified to not only help you fully leverage the AWS platform to build a cloud roadmap, but also to fuel your digital transformation by helping you adopt/embed cutting-edge technologies within your business wireframe like data & analytics, AI/ML, cognitive automation, etc. to help you achieve your business goals! Read more ▶

Image: 9 top fuzzing tools: Finding the weirdest application errors

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: Hardware and firmware vulnerabilities: A guide to the threats

Hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

 
 
Image: 8 common pen testing mistakes and how to avoid them

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them. Read more ▶

Image: How to evaluate a CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one. Read more ▶

Image: 4 authentication use cases: Which protocol to use?

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. Read more ▶

Image: How to manage Windows 10 1903 and 1909 security updates

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know. Read more ▶

Data Sheet: Hitachi Vantara

Hitachi Ops Center Automator Datasheet

Read this datasheet to learn how Hitachi Ops Center Automator helps you automate data center operations to improve IT operational efficiency and the storage provisioning process, freeing your staff to focus on new innovations. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com