CSO

CSO Update

March 28, 2019

Image: What your antivirus software doesn’t tell you, and how to get that data

What your antivirus software doesn’t tell you, and how to get that data

Antivirus software detects and removes malware, but how fast and how accurate? Here's no-cost way to find out and hold antivirus vendors accountable. Read more ▶

Your Must-Read Stories

•

Spyware explained: How it works and how to prevent it

•

How to time-sync Windows systems

•

6 secrets to CISO job longevity

•

Why AI fuzzing may be the next big cybersecurity threat

•

ASUS users fall victim to supply chain attack through backdoored update

•

The cybersecurity technology consolidation conundrum

eBook: ServiceNow

Now on Now Story: Taking charge of ServiceNow’s IT project portfolio

In this eBook, we explain the ServiceNow® IT Business Management (ITBM) journey–how we’ve transformed the way we manage our IT project portfolio to deliver predictable, high-value business outcomes. Read more ▶

Image: Spyware explained: How it works and how to prevent it

Spyware explained: How it works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: How to time-sync Windows systems

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation. Read more ▶

 
 
Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

Image: Why AI fuzzing may be the next big cybersecurity threat

Why AI fuzzing may be the next big cybersecurity threat

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals. Read more ▶

Image: ASUS users fall victim to supply chain attack through backdoored update

ASUS users fall victim to supply chain attack through backdoored update

Attackers hijack ASUS's auto-update process to deliver malware. Preventing such attacks is difficult, but vendors and their customers can do more to mitigate the risk. Read more ▶

Image: The cybersecurity technology consolidation conundrum

The cybersecurity technology consolidation conundrum

As point tools come together as platforms and solutions, cybersecurity professionals need to think outside the box about procurement, implementation, and operations. Read more ▶

eBook: Veeam Software Corporation

Data Protection by the Numbers for Dummies

Veeam feels it’s critical for you to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.