CSO

CSO Daily

September 23, 2019

Image: Senator Warner seeks

Senator Warner seeks "grand alliance" to protect against surveillance threat from China’s tech dominance

The senator believes Chinese companies will be required to aid surveillance of the US, especially as 5G networks roll out. Read more ▶

Your Must-Read Stories

•

Lessons learned through 15 years of SDL at work

•

3 ways to improve PC security

•

The top 5 email encryption tools: More capable, better integrated

•

How to detect and halt credential theft via Windows WDigest

•

10 signs you're being socially engineered

•

Security Recruiter Directory

White Paper: IBM

5 Epic Fails in Data Security

Data security is on everyone’s mind these days, and for good reason. The number of successful data breaches is growing thanks to the increased attack surfaces created by more complex IT environments, widespread adoption of cloud services and the increasingly sophisticated nature of cyber criminals. This paper looks at five of the most prevalent – and avoidable – data security missteps organizations are making today, and how these “epic fails” open them up to potentially disastrous attacks. Read more ▶

Image: Lessons learned through 15 years of SDL at work

Lessons learned through 15 years of SDL at work

In short? Security Development Lifecycle is all about the developers... Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: 3 ways to improve PC security

3 ways to improve PC security

Insider Pro columnist Jack Gold writes that organizations must focus on three key areas if they want to protect their PCs -- and ultimately the entire organization -- from security breaches. Read more ▶

 
 
Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Image: How to detect and halt credential theft via Windows WDigest

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them. Read more ▶

Image: 10 signs you're being socially engineered

10 signs you're being socially engineered

Scammers will try to trick you and your organization's users into giving up credentials or other sensitive date. Be skeptical if you see any of these signs. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

White Paper: Akamai Technologies Inc

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.