CSO

CSO Update

August 01, 2019

Image: How attackers identify your organization's weakest links

How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

Your Must-Read Stories

•

6 lessons from Venmo’s lax approach to API security

•

Stealing money in the digital age: The dark industry of trafficking financial data

•

Critical VxWorks flaws expose millions of devices to hacking

•

How JustEat finds and trains in-house security talent

•

What is a zero day? A powerful but fragile weapon

•

How MIT's Fiat Cryptography might make the web more secure

eBook: Quest Software

Active Directory and Azure AD Security Best Practices

Why worry about hyrbid AD security? Read more ▶

Image: 6 lessons from Venmo’s lax approach to API security

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

 
 
Image: Critical VxWorks flaws expose millions of devices to hacking

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and medical equipment. Read more ▶

Image: How JustEat finds and trains in-house security talent

How JustEat finds and trains in-house security talent

Employees in other departments might have skills that play well in security and the desire to make the jump. JustEat CISO Kevin Fielder explains how he introduces those people to cybersecurity and integrates them with the team. Read more ▶

Image: What is a zero day? A powerful but fragile weapon

What is a zero day? A powerful but fragile weapon

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. These vulnerabilities fetch high prices on the black market Read more ▶

Image: How MIT's Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance. Read more ▶

Research/Infographic: Tata Communications (America) Inc

IZO SD WAN by Cisco and User Case Infographics

Check out this infographic to learn how three leading industries are leveraging SDWAN as a game-changing solution for their network. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.