CSO

CSO Daily

November 04, 2019

Image: US Department of Justice push for encryption backdoors might run afoul of First Amendment

US Department of Justice push for encryption backdoors might run afoul of First Amendment

Is encryption code speech? Earlier court rulings suggest that it is, legally, and therefore subject to First Amendment protections. Read more ▶

Your Must-Read Stories

•

What women want in the IT workplace: 6 key factors for hiring and retention

•

What you need to know about the US CLOUD Act and the UK COPOA Act

•

Attackers phish Office 365 users with fake voicemail messages

•

The biggest data breach fines, penalties and settlements so far

•

What is cryptojacking? How to prevent, detect, and recover from it

•

Dial 211 for cyberattacks

White Paper: CBTS

CIO’s Guide to Collaboration: Deliver a Consistent UX Without Sacrificing Security

Modern business takes place on all kinds of devices, among users who need to securely connect and innovate from a hotel room as easily as from an office. Read more ▶

Image: What women want in the IT workplace: 6 key factors for hiring and retention

What women want in the IT workplace: 6 key factors for hiring and retention

Women are exiting IT in droves, as companies struggle to hire and engage these valuable employees. The first step to change? Listening to what women want. Read more ▶

Image: This 12-course bundle will teach you how to be an ethical hacker for $39

DEALPOST

This 12-course bundle will teach you how to be an ethical hacker for $39

The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve. Read more ▶

Image: What you need to know about the US CLOUD Act and the UK COPOA Act

What you need to know about the US CLOUD Act and the UK COPOA Act

A new data access agreement between the UK and US streamlines law enforcement’s ability to gain access to data held on foreign soil. Read more ▶

 
 
Image: Attackers phish Office 365 users with fake voicemail messages

Attackers phish Office 365 users with fake voicemail messages

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims. Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more ▶

Image: What is cryptojacking? How to prevent, detect, and recover from it

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

Image: Dial 211 for cyberattacks

Dial 211 for cyberattacks

US consumers and businesses in a few states can now dial 211 for help when victimized by cybercrime. What's needed is a nationwide rollout. Read more ▶

Miscellaneous: IBM

Bridging the Gap Between Legacy and Multicloud

With Himanshu Desai, IBM VP Services Platform with Watson & Multicloud Integration and Arun Hampapur, IBM DE and Director of Development Services Platform With Watson Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.