CSO

CSO Daily

May 23, 2019

Image: Over 90% of data transactions on IoT devices are unencrypted

Over 90% of data transactions on IoT devices are unencrypted

A report from Zscaler reveals some troubling facts about the risks posed by network-connected IoT devices. Read more ▶

Your Must-Read Stories

•

Conducting a proper GDPR audit: 4 key steps

•

How to defend against scams: 14 red flags everyone needs to be aware of

•

Why GE consolidated its identity and access management infrastructure

•

How Microsoft builds empathy between its security and development teams

•

Does your cyber insurance cover social engineering? Read the fine print

•

How to get started using Ghidra, the free reverse engineering tool

Video/Webcast: Connection & HPE

Power High Performance Computing at Notre Dame

Supporting the research endeavors of thousands of scientists at The University of Notre Dame requires powerful compute power. Hear from the Associate Director of the Notre Dame Center for Research Computing as he highlights how HPE delivered the performance and capacity. Read more ▶

Image: Conducting a proper GDPR audit: 4 key steps

Conducting a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to defend against scams: 14 red flags everyone needs to be aware of

How to defend against scams: 14 red flags everyone needs to be aware of

Does your security awareness training program help your employees learn when someone is trying to scam them? Read more ▶

 
 
Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: How Microsoft builds empathy between its security and development teams

How Microsoft builds empathy between its security and development teams

Ongoing cross-training, threat information sharing, executive support and a strong threat modeling infrastructure helps the company's security and development staff work collaboratively. Read more ▶

Image: Does your cyber insurance cover social engineering? Read the fine print

Does your cyber insurance cover social engineering? Read the fine print

Some cyber insurance policies will pay only a small fraction of damages if an attacker used social engineering. Here's how to estimate the risk. Read more ▶

Image: How to get started using Ghidra, the free reverse engineering tool

How to get started using Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.) Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.