CSO

CSO Daily

September 24, 2019

Image: Rich PII enables sophisticated impersonation attacks

Rich PII enables sophisticated impersonation attacks

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account access or commit fraud. Read more ▶

Your Must-Read Stories

•

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

•

CISA’s Krebs seeks more measured approach to election security heading into 2020

•

What a security career will look like in five years

•

The top 5 email encryption tools: More capable, better integrated

•

How to detect and halt credential theft via Windows WDigest

•

6 questions candidates should ask at every security job interview

Video/Webcast: Pure Storage

Managing the Data Deluge to Achieve Clinical Breakthroughs

As patient care evolves, the underlying IT infrastructure that supports today’s healthcare organizations must also shift. One prime example: imaging, where clinicians need quick, real-time access to imaging studies. But imaging data can constrain existing IT infrastructure by quickly and continually growing in volume and variety. Join us as we explore what providers can do to help healthcare organizations manage this data deluge. Read more ▶

Image: Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: CISA’s Krebs seeks more measured approach to election security heading into 2020

CISA’s Krebs seeks more measured approach to election security heading into 2020

The Cybersecurity and Infrastructure Security Agency director says overhyped concern is a problem, while election officials say they reap the benefits of improved communications. Read more ▶

 
 
Image: What a security career will look like in five years

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way. Read more ▶

Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Image: How to detect and halt credential theft via Windows WDigest

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them. Read more ▶

Image: 6 questions candidates should ask at every security job interview

6 questions candidates should ask at every security job interview

The cybersecurity skills shortage means security pros can be picky about where they work. Here's how to suss out bad employers. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.