CSO

CSO Update

April 02, 2019

Image: 11 questions to ask before buying AI-enabled security software

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more ▶

Your Must-Read Stories

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

How hackers use ransomware to hide data breaches and other attacks

What are DMARC, SPF and DKIM? How to master email security with these protocols

What is a honeypot? A trap for catching hackers in the act

What your antivirus software doesn't tell you, and how to get that data

6 secrets to CISO job longevity

White Paper: Technologent

6 IT Infrastructure Must-Haves to Become an Agile Enterprise

Agility is fast becoming table stakes. The following are six IT infrastructure attributes that are critical to supporting an agile enterprise. Read more ▶

Image: Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China's five-year plan face a higher risk of nation-state-sponsored cyber attacks. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: How hackers use ransomware to hide data breaches and other attacks

How hackers use ransomware to hide data breaches and other attacks

Most ransomware is used simply to make money. However, it can also be used as part of an attacker's exit strategy to wipe out forensic evidence of a more serious breach. Read more ▶

 
 
Image: What are DMARC, SPF and DKIM? How to master email security with these protocols

What are DMARC, SPF and DKIM? How to master email security with these protocols

The three main email security protocols complement one another, so implementing them all provides the best protection. That's easier said than done, but these tips can help. Read more ▶

Image: What is a honeypot? A trap for catching hackers in the act

What is a honeypot? A trap for catching hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike. Read more ▶

Image: What your antivirus software doesn't tell you, and how to get that data

What your antivirus software doesn't tell you, and how to get that data

Antivirus software detects and removes malware, but how fast and how accurate? Here's no-cost way to find out and hold antivirus vendors accountable. Read more ▶

Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

White Paper: Iron Mountain

10 Steps to Migration Success

When it comes time to move data centers, the actual migration process tends to be one of the most difficult parts. Download this checklist to understand the 10 steps you need to follow in order to successfully migrate from one data center to another. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.