CSO

CSO Daily

April 03, 2019

Image: Review: Fidelis Deception breathes life into fake assets

Review: Fidelis Deception breathes life into fake assets

Today's skilled hackers know, or at least suspect, that deception is in place and won't blindly follow breadcrumbs to fake assets. To combat this, Fidelis Deception creates realistic, living deception assets. Read more ▶

Your Must-Read Stories

•

How to prepare for the Windows 10 1903 security feature update

•

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

•

How hackers use ransomware to hide data breaches and other attacks

•

11 questions to ask before buying AI-enabled security software

•

Mastering email security with DMARC, SPF and DKIM

•

How spyware works and how to prevent it

White Paper: Infoblox

DNS: An Asset, Not a Liability

DNS can become the first line of defense against advanced threats. Read more ▶

Image: How to prepare for the Windows 10 1903 security feature update

How to prepare for the Windows 10 1903 security feature update

Microsoft is changing the way it does Windows 10 feature updates, and that will affect how you schedule update deferrals. Here's what you need to know. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks. Read more ▶

 
 
Image: How hackers use ransomware to hide data breaches and other attacks

How hackers use ransomware to hide data breaches and other attacks

Most ransomware is used simply to make money. However, it can also be used as part of an attacker’s exit strategy to wipe out forensic evidence of a more serious breach. Read more ▶

Image: 11 questions to ask before buying AI-enabled security software

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more ▶

Image: Mastering email security with DMARC, SPF and DKIM

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. Read more ▶

Image: How spyware works and how to prevent it

How spyware works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.