CSO

CSO Update

March 05, 2019

Image: Better, badder, bigger SIEM coming your way, courtesy of Google

Better, badder, bigger SIEM coming your way, courtesy of Google

Google/Alphabet's Chronicle cybersecurity moonshot has a doozy of a mega-gargantuan SIEM with huge pluses--and minuses. Take note. Read more ▶

Your Must-Read Stories

Hottest new cybersecurity products at RSA 2019

What is Mimikatz? And how to defend against this password stealing tool

3 ways to mitigate shadow IoT risks

How to become an ethical hacker

Is the world ready for the next big ransomware attack?

Best security software, 2019: Lab-tested reviews of today's top tools

White Paper: Logicalis

Nail Down Network Management First

One common goal is to embrace new opportunities. Learn how a strong network core can link your vital internal and external services. Read more ▶

Image: Hottest new cybersecurity products at RSA 2019

Hottest new cybersecurity products at RSA 2019

This year's RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: What is Mimikatz? And how to defend against this password stealing tool

What is Mimikatz? And how to defend against this password stealing tool

Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Read more ▶

 
 
Image: 3 ways to mitigate shadow IoT risks

3 ways to mitigate shadow IoT risks

When someone in your organization starts using internet-connected devices without IT's knowledge, that's shadow IoT. Here's what you need to know about its growing risk. Read more ▶

Image: How to become an ethical hacker

How to become an ethical hacker

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here's what ethical hacking entails and the certifications and training you need to become an ethical hacker. Read more ▶

Image: Is the world ready for the next big ransomware attack?

Is the world ready for the next big ransomware attack?

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating. Read more ▶

Image: Best security software, 2019: Lab-tested reviews of today's top tools

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

White Paper: Logicalis

Getting IoT Right:Tips for Successful IoT/Analytics Projects

Check out tips for Successful IoT/Analytics Projects here. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.