CSO

CSO Update

June 16, 2019

Image: Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Unlike Rowhammer, which only allows for data corruption, the newly discovered RAMBleed vulnerability provides a way to grab data such as encryption keys from memory. Read more ▶

Your Must-Read Stories

•

Security shines at Cisco Live

•

What is PKI? And how it secures just about everything online

•

How to disable basic authentication in Microsoft Office 365

•

3 email security protocols that help prevent address spoofing: How to use them

•

6 ways malware can bypass endpoint protection

•

The CSO guide to top security conferences, 2019

eBook: Aras

A Blueprint for Digital Transformation: Meeting the Challenge of Product Complexity for Global Manufacturers

In the first eBook, “How Most Companies are Getting it Wrong with Digital Transformation”, we provided a definition of the Digital Thread and its importance as part of an organization’s Digital Transformation. In this eBook, we provide a blueprint to begin your move to the Digital Thread, in five concrete steps, with examples of companies who are actively pursuing it within their organizations. Read more ▶

Image: Security shines at Cisco Live

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications. Read more ▶

 
 
Image: How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more ▶

Image: 3 email security protocols that help prevent address spoofing: How to use them

3 email security protocols that help prevent address spoofing: How to use them

DMARC, DKIM and SPF will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think. Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

White Paper: JAMF

A Comprehensive Guide: Zero-touch Apple Device Deployments for Beginners

Looking for the most efficient way to deploy Apple devices at your organization? You’ve come to the right place. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.