CSO

CSO Update

August 06, 2019

Image: Looking for answers at Black Hat 2019: 5 important cybersecurity issues

Looking for answers at Black Hat 2019: 5 important cybersecurity issues

As Black Hat 2019 begins, the cybersecurity topics top of mind include network security platforms, threat detection/response services, new cloud security strategies, and clarification around security analytics. Read more ▶

Your Must-Read Stories

Famous social engineering attacks: 12 crafty cons

Review: How Nyotron Paranoid puts endpoint security worries to rest

What is a computer worm? How this self-spreading malware wreaks havoc

6 lessons from Venmo's lax approach to API security

How MIT's Fiat Cryptography might make the web more secure

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

White Paper: Dell & ESI

The Business Value of Dell EMC Flash Storage

Technology is quickly moving to the forefront as organizations undertake digital and information technology (IT) transformation projects that enable strategic differentiation in a world where users are leveraging applications and data in new ways. Read more ▶

Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: There's finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There's finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Review: How Nyotron Paranoid puts endpoint security worries to rest

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious. Read more ▶

 
 
Image: What is a computer worm? How this self-spreading malware wreaks havoc

What is a computer worm? How this self-spreading malware wreaks havoc

A worm is a form of malware (malicious software) that operates as a self-contained application and can transfer and copy itself from computer to computer. Read more ▶

Image: 6 lessons from Venmo's lax approach to API security

6 lessons from Venmo's lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: How MIT's Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance. Read more ▶

Image: From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

From LinkedIn scraping to Office 365 attacks: How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.