CSO

CSO Daily

December 04, 2018

Image: Top application security tools for 2019

Top application security tools for 2019

Checking for security flaws in your applications is essential. These tools can help find and fix them. Read more ▶

Your Must Read Stories

•

Top application security tools for 2019

•

What is physical security? How to keep your facilities and devices safe from on-site attackers

•

US senator proposes jailing execs, fining companies for data breaches

•

Learn to play defense by hacking these broken web apps

•

10 essential PowerShell security scripts for Windows administrators

•

How to reach that person who will click on anything

•

Cyber threats fueled by AI: Security's next big challenge

White Paper: Cohesity

Solution Brief: Bringing Enterprise Grade Capabilities to the Public Cloud for Secondary Data

Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however weren’t architected with the cloud in mind. Read more ▶

Image: What is physical security? How to keep your facilities and devices safe from on-site attackers

What is physical security? How to keep your facilities and devices safe from on-site attackers

Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: US senator proposes jailing execs, fining companies for data breaches

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches. Read more ▶

 
 
Image: Learn to play defense by hacking these broken web apps

Learn to play defense by hacking these broken web apps

OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management. Read more ▶

Image: 10 essential PowerShell security scripts for Windows administrators

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read more ▶

Image: How to reach that person who will click on anything

How to reach that person who will click on anything

There's always that one person who falls for every phishing scam. This is how you break them of that habit. Read more ▶

Image: Cyber threats fueled by AI: Security's next big challenge

Cyber threats fueled by AI: Security's next big challenge

Security has always been an arms race. But the addition of AI is like jumping from tomahawks to Tomahawk missiles. Read more ▶

Case Study: Cohesity

UCSB Consolidates Their Data Protection on Cohesity's Single, Web-Scale Platform

Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting. Read more ▶

You are currently subscribed to Editorial - CSO Daily as newsletter@newslettercollector.com.
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.