CSO

CSO Daily

November 14, 2019

Image: What you need to know about the new OWASP API Security Top 10 list

What you need to know about the new OWASP API Security Top 10 list

APIs now account for 40% of the attack surface for all web-enabled apps. OWASP has identified 10 areas where enterprises can lower that risk. Read more ▶

Your Must-Read Stories

•

What is application security? A process and tools for securing software

•

Attention cybersecurity entrepreneurs: CISOs want simplicity!

•

How to lock down enterprise web browsers

•

Twitter spy scandal a wake-up call for companies to clean up their data access acts

•

How much does it cost to launch a cyberattack?

•

What is Security Onion? And is it better than a commercial IDS?

eBook: Netscout Systems Inc

Strengthen Cybersecurity with Visibility

This eBook offers tips and best practices for how to best establish a strong cybersecurity posture by ensuring comprehensive and consistent visibility into all network traffic, providing SecOps teams with the data they need to proactively detect, investigate, and mitigate cyberthreats. Read more ▶

Image: What is application security? A process and tools for securing software

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. Read more ▶

Image: Truebill can help you manage your finances—and it’s free to download

DEALPOST

Truebill can help you manage your finances—and it’s free to download

Truebill makes it easy to track your monthly budget and lower unnecessary payments. Read more ▶

Image: Attention cybersecurity entrepreneurs: CISOs want simplicity!

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to make the most of the changing market. Read more ▶

 
 
Image: How to lock down enterprise web browsers

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately. Read more ▶

Image: Twitter spy scandal a wake-up call for companies to clean up their data access acts

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies. Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

Image: What is Security Onion? And is it better than a commercial IDS?

What is Security Onion? And is it better than a commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it. Read more ▶

White Paper: Unitrends

Unitrends Backup and DRaaS IT Buyer’s Guide

With hundreds of vendors available, how do you pick the best Backup and Disaster Recovery solution for your organization? We examine the five best ways to beat data loss and downtime. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.