CSO

CSO Daily

June 28, 2019

Image: How updates to MongoDB work to prevent data breaches

How updates to MongoDB work to prevent data breaches

MongoDB aims to prevent exposed data stores by encrypting data in a way that makes it useless if compromised. Read more ▶

Your Must-Read Stories

•

Is the digital identity layer missing or just misplaced?

•

What is a botnet? When armies of infected IoT devices attack

•

I can get and crack your password hashes from email

•

Harness the NIST CSF to boost your security and compliance

•

How security operations centers are adapting to the cloud era

•

Security Recruiter Directory

Solution Center: Slalom Consulting

Strengthen Pharmacovigilance

Read how working with Slalom and AWS helped the global pharmaceutical company increase access to relevant data to strengthen pharmacovigilance. Read more ▶

Image: Is the digital identity layer missing or just misplaced?

Is the digital identity layer missing or just misplaced?

The orchestration of existing services and data could provide a digital identity layer that gives the internet a common way to handle identity for all consumers. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is a botnet? When armies of infected IoT devices attack

What is a botnet? When armies of infected IoT devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations. Read more ▶

 
 
Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

Image: Harness the NIST CSF to boost your security and compliance

Harness the NIST CSF to boost your security and compliance

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. Read more ▶

Image: How security operations centers are adapting to the cloud era

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

White Paper: Techwave

Modernize your approach to application development with Techwave and AWS

Read more to learn how you can modernize your approach to Application Development with Techwave and AWS. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.