CSO

CSO Daily

June 11, 2019

Image: How to use Azure Automation to issue Let's Encrypt certificates

How to use Azure Automation to issue Let's Encrypt certificates

Use Azure Automation with the Let's Ecrypt free certificate authority to create, validate and install certificates on a firewall. Read more ▶

Your Must-Read Stories

•

From phish to network compromise in two hours: How Carbanak operates

•

What is Magecart? How this hacker group steals payment card data

•

Best new Windows 10 security features: Windows Sandbox, more update options

•

Coventry University puts security at the heart of its cloud-first strategy

•

How do you secure the cloud? New data points a way

•

10 penetration testing tools the pros use

Video/Webcast: Pulse Secure

2019 State of Enterprise Secure Access; enabling multi-cloud and Zero Trust

Join this IDG research-based webcast and to understand the extent of hybrid IT secure access challenges, threats, initiatives, practices and technologies. Read more ▶

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is Magecart? How this hacker group steals payment card data

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. Read more ▶

 
 
Image: Best new Windows 10 security features: Windows Sandbox, more update options

Best new Windows 10 security features: Windows Sandbox, more update options

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1903 feature release. Read more ▶

Image: Coventry University puts security at the heart of its cloud-first strategy

Coventry University puts security at the heart of its cloud-first strategy

The school goes cloud-first but aims to lead its sector when it comes to cybersecurity. Read more ▶

Image: How do you secure the cloud? New data points a way

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy. Read more ▶

Image: 10 penetration testing tools the pros use

10 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Miscellaneous: Splunk

The Present and Future of Security Operations

Learn about the technologies, processes, and trends that may help CISOs overcome today's security operations challenges and develop a well-organized and operative future-oriented strategy. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.