What is a side channel attack? How these end-runs around encryption put everyone at risk Outside-the-box malware is getting more common, security researchers warn CSO Update April 18, 2019 What is a side channel attack? How these end-runs around encryption put everyone at risk Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more ▶ Your Must-Read Stories • Outside-the-box malware is getting more common, security researchers warn • How to improve container security • How OneLogin responded to its breach and regained customer trust • How and when to set Windows logging to UTC time • Cybercrime groups raise the bar for security teams by borrowing APT techniques • Why security-IT alignment still fails Video/Webcast: Avi Networks Reconsider TCPdump and Move Forward with Modern Troubleshooting Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Read more ▶ Outside-the-box malware is getting more common, security researchers warn Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry. Read more ▶ FROM OUR BUSINESS PARTNERS You Can Now Get This Award-Winning VPN For Just $1/month With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶ How to improve container security Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Here's how to do it. Read more ▶ How OneLogin responded to its breach and regained customer trust After its second incident in less than 12 years, incoming OneLogIn CEO Brad Brooks saw the need to instill a security-first mindset in the company and relay that message to wary customers. Read more ▶ How and when to set Windows logging to UTC time As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more ▶ Cybercrime groups raise the bar for security teams by borrowing APT techniques Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more ▶ Why security-IT alignment still fails Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more ▶ Video/Webcast: Sungard & AWS 2019 IT New Year Resolutions The utilization of data and analytics applications to identify critical findings can provide an organization with competitive and operational advantage. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.