CSO

CSO Daily

February 14, 2020

Image: How to fight hidden malware on Windows networks

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network. Read more ▶

Your Must-Read Stories

•

The 25 worst passwords of 2019, and 8 tips for improving password security

•

10 tough security interview questions, and how to answer them

•

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

•

Cybersecurity spending trends, 2020

•

DDoS explained: How distributed denial of service attacks are evolving

•

8 steps to being (almost) completely anonymous online

White Paper: Qlik Technologies Inc

Eckerson Group Report: Deep Dive Data Warehouse Automation

Take a deep dive into data warehouse automation (DWA) to know its’ history, drivers and evolving capabilities. Learn how you can reduce the dependency on ETL scripting, advance your user experience, implementation, maintenance and updates of your data warehouse and data mart environments with Qlik Compose™. Read more ▶

Image: The 25 worst passwords of 2019, and 8 tips for improving password security

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: 10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews. Read more ▶

 
 
Image: More targeted, sophisticated and costly: Why ransomware might be your biggest threat

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶

Image: Cybersecurity spending trends, 2020

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities. Read more ▶

Image: DDoS explained: How distributed denial of service attacks are evolving

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger. Read more ▶

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

White Paper: Qlik Technologies Inc

Whitepaper: Real-Time Database Streaming for Kafka

Read this whitepaper to learn about the drivers for database streaming for Apache Kafka and how Qlik Replicate™ provides several differentiated advantages for Kafka and streaming architectures, including one to many publication capabilities, automated data type mapping, metadata integration, transactional consistency safeguards and configuration flexibility. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com