CSO

CSO Update

March 03, 2019

Image: Qbot malware resurfaces in new attack

Qbot malware resurfaces in new attack

This new persistent and difficult-to-detect Qbot version is designed to steal financial information. Read more ▶

Your Must-Read Stories

10 tips to keep intellectual property safe

Why we can't stop botnets

Elasticsearch clusters face attacks from multiple hacker groups

The best password advice right now (Hint: It's not the NIST guidelines)

Dow Jones watchlist of high-risk businesses, people found on unsecured database

Best security software, 2019: Lab-tested reviews of today's top tools

White Paper: IDG

IDG — Insights Intent and Engagement

IDG marketing services accelerates purchasing and deepens engagement, leveraging our history of creating actionable content to help audiences understand technology. We create custom content with marketing impact across digital, video, mobile, social and research, employing our intimate knowledge of our client's goals. Read more ▶

Image: 10 tips to keep intellectual property safe

10 tips to keep intellectual property safe

Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets. This primer covers everything from establishing basic policies and procedures for IP protection. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: Why we can't stop botnets

Why we can't stop botnets

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations. Read more ▶

 
 
Image: Elasticsearch clusters face attacks from multiple hacker groups

Elasticsearch clusters face attacks from multiple hacker groups

If you are running an older version of Elasticsearch, make sure you've patched its known vulnerabilities or consider upgrading. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: Dow Jones watchlist of high-risk businesses, people found on unsecured database

Dow Jones watchlist of high-risk businesses, people found on unsecured database

A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. Read more ▶

Image: Best security software, 2019: Lab-tested reviews of today's top tools

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.