CSO

CSO Daily

December 10, 2019

Image: The race for quantum-proof cryptography

The race for quantum-proof cryptography

Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research. Read more ▶

Your Must-Read Stories

•

How a nuclear plant got hacked

•

9 top fuzzing tools: Finding the weirdest application errors

•

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

•

How to evaluate a CASB

•

8 common pen testing mistakes and how to avoid them

•

How to manage Windows 10 1903 and 1909 security updates

Data Sheet: ServiceNow Inc

ServiceNow Finance Close Automation Data Sheet

Get this data sheet to see how to reduce risk associated with the close process, increase team satisfaction and accelerate your financial close. Read more ▶

Image: How a nuclear plant got hacked

How a nuclear plant got hacked

India's Kudankulam Nuclear Power Plant (KNPP) publicly admitted they discovered malware on their networks. It likely could have been easily avoided. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: 9 top fuzzing tools: Finding the weirdest application errors

9 top fuzzing tools: Finding the weirdest application errors

Fuzz testing tools root out odd programming errors that might result in dangerous unexpected application errors that attackers can exploit. Read more ▶

 
 
Image: 2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year. Read more ▶

Image: How to evaluate a CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one. Read more ▶

Image: 8 common pen testing mistakes and how to avoid them

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them. Read more ▶

Image: How to manage Windows 10 1903 and 1909 security updates

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know. Read more ▶

Miscellaneous: R Systems & AWS

Cloud Roadmap Assesment for AWS

R Systems, an Advanced-tier AWS Partner, and a global leader in AI/Analytics services, is uniquely qualified to not only help you fully leverage the AWS platform to build a cloud roadmap, but also to fuel your digital transformation by helping you adopt/embed cutting-edge technologies within your business wireframe like data & analytics, AI/ML, cognitive automation, etc. to help you achieve your business goals! Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com