CSO

CSO Daily

April 22, 2019

Image: Microsoft Office now the most targeted platform, as browser security improves

Microsoft Office now the most targeted platform, as browser security improves

The number of attacks carried out using the popular suite has increased in the past two years, Kaspersky Lab researchers say. Read more ▶

Your Must-Read Stories

•

How New York City plans to become a cybersecurity hub

•

What is the EU's revised Payment Services Directive (PSD2) and its impact?

•

Why security-IT alignment still fails

•

Wipro breach highlights third-party risk from large IT services providers

•

How to protect yourself from PC hardware and hardware driver vulnerabilities

•

Assume breach is for losers: These steps will stop data breaches

Video/Webcast: Avi Networks

Reconsider TCPdump and Move Forward with Modern Troubleshooting

Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Read more ▶

Image: How New York City plans to become a cybersecurity hub

How New York City plans to become a cybersecurity hub

America's largest city has been hit hard by the cybersecurity skills shortage and is working to grow its cybersecurity workforce. Read more ▶

Image: You Can Now Get This Award-Winning VPN For Just $1/month

DEALPOST

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: What is the EU's revised Payment Services Directive (PSD2) and its impact?

What is the EU's revised Payment Services Directive (PSD2) and its impact?

The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere. Read more ▶

 
 
Image: Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more ▶

Image: Wipro breach highlights third-party risk from large IT services providers

Wipro breach highlights third-party risk from large IT services providers

After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk. Read more ▶

Image: How to protect yourself from PC hardware and hardware driver vulnerabilities

How to protect yourself from PC hardware and hardware driver vulnerabilities

Attackers have hijacked PC motherboard update software and hardware drivers to install malware. Here's how to identify vulnerable systems and prevent driver-delivered malware. Read more ▶

Image: Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

Yes, you do need to be prepared should your organization be breached, but countering social engineering, patching, multi-factor authentication and a solid backup plan will keep them from happening. Read more ▶

White Paper: Flexera Software

Essential Strategies for Managing Cloud Costs

Is your enterprise IT budget stuck in the clouds? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.