CSO

CSO Daily

September 26, 2019

Image: Quantum supremacy might be here, upending conventional encryption

Quantum supremacy might be here, upending conventional encryption

Last week Google posted and quickly took down a report announcing a stunning quantum computing milestone. Regardless of whether the report was premature, conventional encryption’s days are numbered. Read more ▶

Your Must-Read Stories

•

3 DevSecOps success stories

•

Magecart web skimming group targets public hotspots and mobile users

•

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

•

Rich PII enables sophisticated impersonation attacks

•

What a security career will look like in five years

•

10 signs you're being socially engineered

Miscellaneous: Keap

26 ideas to get your next sales promotion noticed

Learn about 26 sales promotion examples curated from Milled.com to get your creative juices flowing when thinking through your own. They are grouped into five common categories: flash sale; buy one, get one; coupon or discount with purchase; tripwire; and recurring sale. Read more ▶

Image: 3 DevSecOps success stories

3 DevSecOps success stories

Learn how three very different companies — Microsoft, Verizon and the Pokemon Company — got their development and security teams to work together smoothly. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Magecart web skimming group targets public hotspots and mobile users

Magecart web skimming group targets public hotspots and mobile users

IBM researchers discover new Magecart scripts suggest planned advertisement injection through Wi-Fi and supply chain attacks. Read more ▶

 
 
Image: Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own. Read more ▶

Image: Rich PII enables sophisticated impersonation attacks

Rich PII enables sophisticated impersonation attacks

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account access or commit fraud. Read more ▶

Image: What a security career will look like in five years

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way. Read more ▶

Image: 10 signs you're being socially engineered

10 signs you're being socially engineered

Scammers will try to trick you and your organization's users into giving up credentials or other sensitive date. Be skeptical if you see any of these signs. Read more ▶

Miscellaneous: OpenText

AIIM Tipsheet: 4 Questions Every Professional Should Ask About Their CRM System

Enterprise Content Management is evolving into a set of capabilities that are smarter and more connected than ever before. Discover the 4 questions every C-level Executive and business professional should ask about their CRM Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.