CSO

CSO Daily

March 04, 2019

Image: Is the world ready for the next big ransomware attack?

Is the world ready for the next big ransomware attack?

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating. Read more ▶

Your Must-Read Stories

•

Qbot malware resurfaces in new attack against businesses

•

How to become an ethical hacker

•

The best password advice right now (Hint: It's not the NIST guidelines)

•

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

•

Verizon builds a DevSecOps culture with its developer dashboard

•

How much does it cost to launch a cyberattack?

White Paper: AGARI Data Inc

Q1 Email Fraud Report

In this report, we look at trends in phishing and email fraud against business, as well as those targeting their customers through domain spoofing and other tactics. Read more ▶

Image: Qbot malware resurfaces in new attack against businesses

Qbot malware resurfaces in new attack against businesses

This new persistent and difficult-to-detect Qbot version is designed to steal financial information. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: How to become an ethical hacker

How to become an ethical hacker

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker. Read more ▶

 
 
Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019. Read more ▶

Image: Verizon builds a DevSecOps culture with its developer dashboard

Verizon builds a DevSecOps culture with its developer dashboard

Verizon's developer dashboard not only records how vulnerabilities are introduced and by whom, but provides indicators as to why. The goal isn't to name and shame, but to instill a secure-by-design mindset. Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

White Paper: AGARI Data Inc

Osterman "Why You Need Third-Party Solutions for O365"

Office 365 is a robust and capable platform – Osterman Research recommends that organizations seriously consider using it. However, a platform of the scope and scale of Office 365 will never manage to be everything to every organization in every scenario, but the benefits of migrating to the platform must outweigh whatever limitations it includes. As a result, third-party solutions should be seriously considered for deployment, either as replacements for the native capabilities available from Microsoft, or as supplements that will provide enhanced functionality to meet specific organizational requirements. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.