CSO

CSO Update

August 04, 2019

Image: 7 must-see talks at Black Hat and DEF CON 2019

7 must-see talks at Black Hat and DEF CON 2019

Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology. Read more ▶

Your Must-Read Stories

What is cryptojacking? How to prevent, detect, and recover from it

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

Security analytics: It's all about the data

The CSO guide to top security conferences, 2019

Top cyber security certifications: Who they're for, what they cost, and which you need

6 lessons from Venmo's lax approach to API security

White Paper: Dell & Dasher Technologies

The Business Value of Dell EMC Flash Storage

This IDC study demonstrates the extent to which organizations can benefit from much-improved performance and optimized costs with Dell EMC Flash Storage solutions. Read more ▶

Image: What is cryptojacking? How to prevent, detect, and recover from it

What is cryptojacking? How to prevent, detect, and recover from it

Criminals are using ransomware-like tactics and poisoned websites to get your employees' computers to mine cryptocurrencies. Here's what you can do to stop it. Read more ▶

Image: There's finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There's finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

 
 
Image: Security analytics: It's all about the data

Security analytics: It's all about the data

More security data drives the need for data modeling, data management, and data discipline Read more ▶

Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online's calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

Image: Top cyber security certifications: Who they're for, what they cost, and which you need

Top cyber security certifications: Who they're for, what they cost, and which you need

Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications. Read more ▶

Image: 6 lessons from Venmo's lax approach to API security

6 lessons from Venmo's lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

White Paper: Box

Magic Quadrant for Content Collaboration Platforms

Gartner names Box a Leader in Content Collaboration Platforms. Again. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.