CSO

CSO Daily

July 30, 2019

Image: Critical VxWorks flaws expose millions of devices to hacking

Critical VxWorks flaws expose millions of devices to hacking

Researchers have found 11 serious vulnerabilities in VxWorks, the world's most popular real-time operating system (RTOS) that powers over 2 billion devices including enterprise network firewalls and routers, industrial controllers and medical equipment. Read more ▶

Your Must-Read Stories

•

6 API security lessons from the Venmo breach

•

What is a CASB? What you need to know before you buy

•

Stealing money in the digital age: The dark industry of trafficking financial data

•

15 signs you've been hacked -- and how to fight back

•

Managed security services will take center stage at Black Hat

•

The biggest data breach fines, penalties and settlements so far

Video/Webcast: FireMon

5 Steps to Keeping Firewall Rules Up-to-Date and Secure

Global network security policy is difficult. And keeping that policy up-to-date is even more difficult. In this webinar, we’ll explore how to address this risky burden with help from subject matter experts at FireMon. Read more ▶

Image: 6 API security lessons from the Venmo breach

6 API security lessons from the Venmo breach

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: What is a CASB? What you need to know before you buy

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems. Read more ▶

 
 
Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

Image: 15 signs you've been hacked -- and how to fight back

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked. Read more ▶

Image: Managed security services will take center stage at Black Hat

Managed security services will take center stage at Black Hat

With organizations increasingly needing help detecting and responding to threats, expect managed security services to be one of the main themes at Black Hat 2019. Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting. Read more ▶

White Paper: FCN, Inc.

Adopting Hyper Converged Infrastructure Solutions for Government Agencies

Read this White Paper to learn how NetApp HCI, a complete turnkey VMware environment, offers compute and storage hardware and the VMware hypervisor. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.