CSO

CSO Daily

July 02, 2019

Image: What is the CISA? How the new federal agency protects critical infrastructure from cyber threats

What is the CISA? How the new federal agency protects critical infrastructure from cyber threats

The Cybersecurity and Infrastructure Security Agency (CISA) is a new federal agency, created to protect the nation's critical infrastructure. Read more ▶

Your Must-Read Stories

•

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

•

Telcos around the world hit by long-term intelligence gathering cyberattack

•

How to establish your business’s risk tolerance

•

Telecom insiders detail hardships posed by Chinese technology ban

•

28 DevSecOps tools for baking security into the development process

•

From phish to network compromise in two hours: How Carbanak operates

eBook: Flexera

eBook: Don't Let Bad Data Derail Good IT Decisions

New eBook: How to get insights from your IT asset management Read more ▶

Image: AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce 2019: Amazon shows its dedication to cloud security

AWS re:Inforce sets the bar for cloud security and the industry. Now Amazon needs to reinforce this leadership in an era of dynamic software development and hybrid cloud computing. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Telcos around the world hit by long-term intelligence gathering cyberattack

Telcos around the world hit by long-term intelligence gathering cyberattack

Operation Soft Cell saw telcos around the world lose over 100GB of call record data, but it could have been much worse. Attackers could have shut down cell networks if they wanted. Read more ▶

 
 
Image: How to establish your business’s risk tolerance

How to establish your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it. Read more ▶

Image: Telecom insiders detail hardships posed by Chinese technology ban

Telecom insiders detail hardships posed by Chinese technology ban

Banning Chinese Telecom vendors Huawei and ZTE creates fear, uncertainty and doubt as well as new supply chain security ideas among small telcos. Read more ▶

Image: 28 DevSecOps tools for baking security into the development process

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools. Read more ▶

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

White Paper: LucidWorks

4 AI Quick Hits You Can Add to Your Enterprise Search App Right Now

Lucidworks has out-of-the-box functionality available that you can add to your application with little to no extra code. If you’re not already using Fusion, the average implementation time for building a Fusion app is not very long. It’s time to get more value out of your data and accelerate your employees. It is time for Fusion. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.