CSO

CSO Update

January 31, 2019

Image: SQL Slammer 16 years later: Four modern-day scenarios that could be worse

SQL Slammer 16 years later: Four modern-day scenarios that could be worse

Nothing has ever come close to the speed at which the SQL Slammer worm took down networks. These very possible scenarios might beat it in terms of speed and damage. Read more ▶

Your Must-Read Stories

•

EFF has an encryption plan for the entire internet

•

How to defend Office 365 from spear-phishing attacks

•

Aflac automates threat intelligence to take a proactive security posture

•

Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

•

10 cybersecurity trends to watch for 2019

•

Top security and privacy TED Talks from 2018

White Paper: Nuxeo

Modern Platform Architecture for Content Services

A properly architected content services platform (CSP) makes it easy to build and deploy content-rich applications. Download this complimentary white paper to explore the 5 core components of a modern CSP that enable scalability, performance, ease of use, and integration. Read more ▶

Image: EFF has an encryption plan for the entire internet

EFF has an encryption plan for the entire internet

Spurred by government surveillance of data, the Electronic Frontier Foundation is making progress toward its goal of encrypting all internet traffic using technology and scorecards. Read more ▶

Image: You can sign up for this team collaboration app for free today

FROM OUR BUSINESS PARTNERS

You can sign up for this team collaboration app for free today

Unlock your team’s full potential with free chat, file sharing, and task management. Read more ▶

Image: How to defend Office 365 from spear-phishing attacks

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it. Read more ▶

 
 
Image: Aflac automates threat intelligence to take a proactive security posture

Aflac automates threat intelligence to take a proactive security posture

Insurance giant Aflac automated large parts of its cyber threat intelligence operations to create an industry-leading program. Read more ▶

Image: Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

Why America is not prepared for a Stuxnet-like cyber attack on the energy grid

The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more. Read more ▶

Image: 10 cybersecurity trends to watch for 2019

10 cybersecurity trends to watch for 2019

In the early days of 2019, cybersecurity is as challenging as ever. We highlight some of the biggest cybersecurity trends that are set to impact the enterprise, security professionals and companies of all sizes in the year ahead. Read more ▶

Image: Top security and privacy TED Talks from 2018

Top security and privacy TED Talks from 2018

IoT security, insecure software, and data privacy are among the top security and privacy TED talks from 2018. Read more ▶

White Paper: Dell EMC and Intel®

The Evolving Market for Primary Storage

One of the defining characteristics of the IT and Digital Transformations is the tremendous drive to put that data to work. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.