CSO

CSO Update

November 14, 2019

Image: Twitter spy scandal a wake-up call for companies to clean up their data access acts

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies. Read more ▶

Your Must-Read Stories

•

What you need to know about the new OWASP API Security Top 10 list

•

How much does it cost to launch a cyberattack?

•

Top SAST and DAST tools that can fix app security problems before deployment

•

Application security explained: A process and tools for securing software

•

What is Security Onion? And is it better than a commercial IDS?

•

5 steps to a successful red team engagement

eBook: Netscout Systems Inc

Strengthen Cybersecurity with Visibility

This eBook offers tips and best practices for how to best establish a strong cybersecurity posture by ensuring comprehensive and consistent visibility into all network traffic, providing SecOps teams with the data they need to proactively detect, investigate, and mitigate cyberthreats. Read more ▶

Image: What you need to know about the new OWASP API Security Top 10 list

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk. Read more ▶

Image: Truebill can help you manage your finances—and it’s free to download

DEALPOST

Truebill can help you manage your finances—and it’s free to download

Truebill makes it easy to track your monthly budget and lower unnecessary payments. Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

 
 
Image: Top SAST and DAST tools that can fix app security problems before deployment

Top SAST and DAST tools that can fix app security problems before deployment

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: Application security explained: A process and tools for securing software

Application security explained: A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. Read more ▶

Image: What is Security Onion? And is it better than a commercial IDS?

What is Security Onion? And is it better than a commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it. Read more ▶

Image: 5 steps to a successful red team engagement

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more ▶

White Paper: Unitrends

Unitrends Backup and DRaaS IT Buyer’s Guide

With hundreds of vendors available, how do you pick the best Backup and Disaster Recovery solution for your organization? We examine the five best ways to beat data loss and downtime. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.