CSO

CSO Daily

April 17, 2019

Image: What is a side channel attack? How these end-runs around encryption put everyone at risk

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more ▶

Your Must-Read Stories

•

Why security-IT alignment still fails

•

How and when to set Windows logging to UTC time

•

Cybercrime groups raise the bar for security teams by borrowing APT techniques

•

FEMA contractor at center of privacy violation provides services to many other agencies

•

Outside-the-box malware is getting more common, security researchers warn

•

How to improve container security

White Paper: Flexera Software

Flexera Technopedia Product EOL/EOS 2018 Report

Don't let obsolete technology get you down. Read more ▶

Image: Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more ▶

Image: You Can Now Get This Award-Winning VPN For Just $1/month

FROM OUR BUSINESS PARTNERS

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: How and when to set Windows logging to UTC time

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more ▶

 
 
Image: Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more ▶

Image: FEMA contractor at center of privacy violation provides services to many other agencies

FEMA contractor at center of privacy violation provides services to many other agencies

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk? Read more ▶

Image: Outside-the-box malware is getting more common, security researchers warn

Outside-the-box malware is getting more common, security researchers warn

Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry. Read more ▶

Image: How to improve container security

How to improve container security

Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Here’s how to do it. Read more ▶

White Paper: Flexera Software

Essential Strategies for Managing Cloud Costs

Is your enterprise IT budget stuck in the clouds? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.