CSO

CSO Update

February 17, 2019

Image: Attackers place cryptojacking apps in the Microsoft App Store

Attackers place cryptojacking apps in the Microsoft App Store

Microsoft has removed eight applications from its app store for Windows that were mining Monero cryptocurrency without users' knowledge. Read more ▶

Your Must-Read Stories

Data breaches exposed 5 billion records in 2018

IBM sets forth with a strong cybersecurity message

How to identify, prevent and remove rootkits in Windows 10

How 5 universities stretch security capabilities, budgets with shared SOC

10 essential steps to improve your security posture

New CISO appointments, February 2019

eBook: GitHub

How GitHub secures open source software

Open source software is everywhere, powering the languages, frameworks, and applications your team uses every day. Read more ▶

Image: Data breaches exposed 5 billion records in 2018

Data breaches exposed 5 billion records in 2018

New report from Risk Based Security shows a downward trend in number breaches and exposed records, Unclear if privacy regulations like GDPR are having an effect. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: IBM sets forth with a strong cybersecurity message

IBM sets forth with a strong cybersecurity message

IBM has a strong cybersecurity message, but there's a gap between IBM security and its corporate vision. If IBM can bridge this gap, it can carve out a unique market position. Read more ▶

 
 
Image: How to identify, prevent and remove rootkits in Windows 10

How to identify, prevent and remove rootkits in Windows 10

Rootkits are among the most difficult malware to detect and remove. Now, new variations are targeting Windows 10 systems. Use this advice to protect yourself from them. Read more ▶

Image: How 5 universities stretch security capabilities, budgets with shared SOC

How 5 universities stretch security capabilities, budgets with shared SOC

Faced with limited resources and constant threat of attack, five midwestern universities created OmniSOC, a CSO50 award-winning joint security operations center, to complement their own on-site SOCs with 24/7 analysis, triage and threat hunting. Read more ▶

Image: 10 essential steps to improve your security posture

10 essential steps to improve your security posture

A strong security posture takes more than having the right defenses in place, you also need to establish solid plans to ensure you react to any breach in the right way. Read more ▶

Image: New CISO appointments, February 2019

New CISO appointments, February 2019

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

White Paper: Dell EMC and Intel®

The Role of Converged and Hyper-Converged Infrastructure in IT Transformation

IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds synonymous with digital transformation, but in actuality, IT Transformation is the set of enabling technologies, processes, and focus areas that make effective digital transformation possible. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.