CSO

CSO Daily

April 02, 2019

Image: Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Chinese hacking groups to ramp up cyber attacks on some industries, experts say

Companies in industries critical to China’s five-year plan face a higher risk of nation-state-sponsored cyber attacks. Read more ▶

Your Must-Read Stories

•

How hackers use ransomware to hide data breaches and other attacks

•

What are DMARC, SPF and DKIM? How to master email security with these protocols

•

Whip your information security into shape with ISO 27001

•

7 keys to a successful IT security career

•

How to report a data breach under GDPR

•

Critical Magento SQL injection flaw could be targeted by hackers soon

White Paper: Technologent

6 IT Infrastructure Must-Haves to Become an Agile Enterprise

Agility is fast becoming table stakes. The following are six IT infrastructure attributes that are critical to supporting an agile enterprise. Read more ▶

Image: How hackers use ransomware to hide data breaches and other attacks

How hackers use ransomware to hide data breaches and other attacks

Most ransomware is used simply to make money. However, it can also be used as part of an attacker’s exit strategy to wipe out forensic evidence of a more serious breach. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: What are DMARC, SPF and DKIM? How to master email security with these protocols

What are DMARC, SPF and DKIM? How to master email security with these protocols

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. Read more ▶

 
 
Image: Whip your information security into shape with ISO 27001

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular information security standards around — and it works for any size business. Read more ▶

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Image: How to report a data breach under GDPR

How to report a data breach under GDPR

Data breach notification requirements are now mandatory and time-sensitive under GDPR. Here's what you need to report and who report it to. Read more ▶

Image: Critical Magento SQL injection flaw could be targeted by hackers soon

Critical Magento SQL injection flaw could be targeted by hackers soon

Popular e-commerce platform Magento has released security patches to fix the flaw. Researchers say update now. Read more ▶

White Paper: Iron Mountain

10 Steps to Migration Success

When it comes time to move data centers, the actual migration process tends to be one of the most difficult parts. Download this checklist to understand the 10 steps you need to follow in order to successfully migrate from one data center to another. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.