CSO

CSO Update

May 07, 2019

Image: How to get started using Ghidra, the free reverse engineering tool

How to get started using Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.) Read more ▶

Your Must-Read Stories

What is GPS spoofing? And how you can defend against it

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Public SAP exploits could enable attacks against thousands of companies

FINRA Rule 4512: U.S. SEC approves electronic signatures

Review: How Aqua secures containers from development to production

Does it matter who the CISO reports to?

eBook: One Identity

IAM for the Real World: Access Management

Access is usually the highest priority when taking on IAM challenges, but how do you do it most effectively? In this e-book, you'll discover: today's key challenges for effective access management; the most common identity administration principles; the significant benefits that can come from getting to one identity. Read more ▶

Image: What is GPS spoofing? And how you can defend against it

What is GPS spoofing? And how you can defend against it

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here's how it works and what you can do to mitigate its risk. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Image: FINRA Rule 4512: U.S. SEC approves electronic signatures

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations. Read more ▶

Image: Review: How Aqua secures containers from development to production

Review: How Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

White Paper: One Identity

10 steps to cleaning up Active Directory -- and keeping them that way

In this document, you will discover 10 steps you can take to remediate user account problems in AD and to prevent them from occurring in the future. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.