CSO

CSO Update

August 27, 2019

Image: Capital One hack shows difficulty of defending against irrational cybercriminals

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns. Read more ▶

Your Must-Read Stories

Can VMware become a leading cybersecurity vendor?

Improving BGP routing security by minding your MANRS

6 ways cybercriminals use commercial infrastructure

Can you be mobile AND secure?

4 takeaways from Black Hat 2019

How to avoid using RDP on Windows

Video/Webcast: Red Hat & AWS

The Business Value of an Agile Platform for Developing and Running Applications with OpenShift on AWS

Application development. It's a critical piece of most organizations. Speed, reliability and security are paramount. An agile and flexible platform for developing applications can be a key competitive advantage. Read more ▶

Image: Can VMware become a leading cybersecurity vendor?

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on. Read more ▶

Image: There's finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There's finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Improving BGP routing security by minding your MANRS

Improving BGP routing security by minding your MANRS

Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project. Read more ▶

 
 
Image: 6 ways cybercriminals use commercial infrastructure

6 ways cybercriminals use commercial infrastructure

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities. Read more ▶

Image: Can you be mobile AND secure?

Can you be mobile AND secure?

Despite the security challenges mobile devices create, there is no going back. Users demand corporate access from their smartphones and companies benefit from this access with increased efficiency, better use of time and improved user experience. Here's how to safe and mobile. Read more ▶

Image: 4 takeaways from Black Hat 2019

4 takeaways from Black Hat 2019

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses. Read more ▶

Image: How to avoid using RDP on Windows

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it's time to stop using it where possible. Here's how. Read more ▶

Video/Webcast: Red Hat

The Business Value of an Agile and Flexible Platform for Developing and Running Applications with OpenShift on AWS

Application development. It's a critical piece of most organizations. Speed, reliability and security are paramount. An agile and flexible platform for developing applications can be a key competitive advantage. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.