CSO

CSO Daily

February 13, 2019

Image: How to prevent and recover from an APT attack through a managed service provider

How to prevent and recover from an APT attack through a managed service provider

Threat actors are compromising their targeted victims through managed service providers (MSPs). These are the steps to take to minimize your exposure and to recover from these attacks if necessary. Read more ▶

Your Must-Read Stories

•

HP gives software robots their own IDs to audit their activities

•

How MitM attacks work and how to prevent them

•

Popular electric scooters can be remotely hacked

•

Have we reached peak privacy? How good IAM and privacy can coexist

•

Bank OZK's vulnerability risk index shows patching priorities everyone understands

•

The new CISO's playbook: 5 rules to follow

eBook: GitHub

Secure software development strategy essentials

In this guide, you'll learn how to secure your engineering team's processes and provide the flexibility they need to do their best work. We'll also address the unique regulatory and technical challenges that software companies face and how GitHub can help. Read more ▶

Image: HP gives software robots their own IDs to audit their activities

HP gives software robots their own IDs to audit their activities

What are your robots up to? HP's new in-house Digital ID for software robots, a CSO50 award winner, makes it easier to keep track of robotic process automation (RPA). Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: How MitM attacks work and how to prevent them

How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are preventable. Read more ▶

 
 
Image: Popular electric scooters can be remotely hacked

Popular electric scooters can be remotely hacked

Researchers warned that Xiaomi M365 scooters can be remotely hacked from 100 meters away to slam on the brakes or to accelerate. Read more ▶

Image: Have we reached peak privacy? How good IAM and privacy can coexist

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management. Read more ▶

Image: Bank OZK's vulnerability risk index shows patching priorities everyone understands

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

White Paper: j2 Global

How Cloud Faxing Lowers Costs and Strengthens Data Security

The objective of this paper is to explore the fax security benefits and vulnerabilities faced by businesses, the costly nature of addressing them, and how other companies have overcome these challenges while strengthening overall fax security. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.