7 must-see talks at Black Hat and DEF CON 2019 What is cryptojacking? How to prevent, detect, and recover from it CSO Update August 04, 2019 7 must-see talks at Black Hat and DEF CON 2019 Information security is fundamentally political. It's refreshing to see so many talks this year that merge policy and technology. Read more ▶ Your Must-Read Stories • What is cryptojacking? How to prevent, detect, and recover from it • From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links • Security analytics: It's all about the data • The CSO guide to top security conferences, 2019 • Top cyber security certifications: Who they're for, what they cost, and which you need • 6 lessons from Venmo's lax approach to API security White Paper: Dell & Dasher Technologies The Business Value of Dell EMC Flash Storage This IDC study demonstrates the extent to which organizations can benefit from much-improved performance and optimized costs with Dell EMC Flash Storage solutions. Read more ▶ What is cryptojacking? How to prevent, detect, and recover from it Criminals are using ransomware-like tactics and poisoned websites to get your employees' computers to mine cryptocurrencies. Here's what you can do to stop it. Read more ▶ DEALPOST There's finally a communication app tailormade for on-the-go teams. Try it free. This intuitive collaboration platform is made for teams that move. Read more ▶ From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶ Security analytics: It's all about the data More security data drives the need for data modeling, data management, and data discipline Read more ▶ The CSO guide to top security conferences, 2019 CSO Online's calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶ Top cyber security certifications: Who they're for, what they cost, and which you need Expand your skills, know-how and career horizons with these highly respected cybersecurity certifications. Read more ▶ 6 lessons from Venmo's lax approach to API security Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶ White Paper: Box Magic Quadrant for Content Collaboration Platforms Gartner names Box a Leader in Content Collaboration Platforms. Again. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy Learn more about Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701 Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com.