CSO

CSO Daily

March 18, 2019

Image: 3 ways to monitor encrypted network traffic for malicious activity

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

Your Must-Read Stories

•

7 hot cybersecurity trends (and 4 going cold)

•

Congress steers clear of industrial control systems cybersecurity

•

Hackers use Slack to hide malware communications

•

Self-sovereign identity: 3 key questions

•

Cybersecurity education in the age of acceleration

•

Is the world ready for the next big ransomware attack?

eGuide: APC by Schneider

Edge Computing

In the era of the Internet of Things, edge computing is fast becoming a necessity. Here’s what you need to know as you consider bringing it into your organization. Read more ▶

Image: 7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: Congress steers clear of industrial control systems cybersecurity

Congress steers clear of industrial control systems cybersecurity

Industry resistance to regulation, complexity of securing ICS systems are roadblocks to passage of critical infrastructure cybersecurity legislation. Read more ▶

 
 
Image: Hackers use Slack to hide malware communications

Hackers use Slack to hide malware communications

A watering hole attack used Slack for its command-and-control communications to avoid network and endpoint detection. Read more ▶

Image: Self-sovereign identity: 3 key questions

Self-sovereign identity: 3 key questions

SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat. Read more ▶

Image: Cybersecurity education in the age of acceleration

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives. Read more ▶

Image: Is the world ready for the next big ransomware attack?

Is the world ready for the next big ransomware attack?

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating. Read more ▶

White Paper: ePlus and Juniper

EX4200 ETHERNET SWITCH with Virtual Chassis Technology

High-performance businesses demand high-performance networking solutions. The Juniper Networks EX2200 Ethernet Switch offers an economical, entry-level, stand-alone solution for access-layer deployments in branch and remote offices, as well as campus networks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.