CSO

CSO Daily

February 19, 2019

Image: Top tools and resources for running a capture the flag competition

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more ▶

Your Must-Read Stories

•

Review: SlashNext is like shooting phish in a barrel

•

7 cheap or free cybersecurity training resources

•

How to identify, prevent and remove rootkits in Windows 10

•

Attackers place cryptojacking apps in the Microsoft App Store

•

Data breaches exposed 5 billion records in 2018

•

Four modern-day scenarios that could be worse than SQL Slammer

White Paper: M-Files Inc.

Best Practices Guide: How to Start, Manage and Implement an ECM Project

This guide works as a practical tool to remind you of topics and steps to consider when planning to implement an Enterprise Content Management solution like M-files. Read more ▶

Image: Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: 7 cheap or free cybersecurity training resources

7 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

 
 
Image: How to identify, prevent and remove rootkits in Windows 10

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them. Read more ▶

Image: Attackers place cryptojacking apps in the Microsoft App Store

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge. Read more ▶

Image: Data breaches exposed 5 billion records in 2018

Data breaches exposed 5 billion records in 2018

New report from Risk Based Security shows a downward trend in number breaches and exposed records, Unclear if privacy regulations like GDPR are having an effect. Read more ▶

Image: Four modern-day scenarios that could be worse than SQL Slammer

Four modern-day scenarios that could be worse than SQL Slammer

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage. Read more ▶

White Paper: M-Files Inc.

How Intelligent Information Management Can Make Your Business More Competitive - 10 Tips for Selecting an ECM System

In today’s competitive business climate, the key is to identify the data that is useful so that we can make informed decisions based on accurate, up-to-date information. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.