CSO

CSO Daily

March 01, 2019

Image: Elasticsearch clusters face attacks from multiple hacker groups

Elasticsearch clusters face attacks from multiple hacker groups

If you are running an older version of Elasticsearch, make sure you've patched its known vulnerabilities or consider upgrading. Read more ▶

Your Must-Read Stories

•

Dow Jones watchlist of high-risk businesses, people found on unsecured database

•

10 tips to keep intellectual property safe

•

Why we can't stop botnets

•

Best security software, 2019: Lab-tested reviews of today's top tools

•

The best password advice right now (Hint: It's not the NIST guidelines)

•

Hottest new cybersecurity products at RSA 2019

White Paper: Circonus

The Art & Science of Service-Level Objectives

Engineer Theo Schlossnagle offers best practices for service-level objectives. Read more ▶

Image: Dow Jones watchlist of high-risk businesses, people found on unsecured database

Dow Jones watchlist of high-risk businesses, people found on unsecured database

A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: 10 tips to keep intellectual property safe

10 tips to keep intellectual property safe

Your company's intellectual property, whether that's patents, trade secrets or just employee know-how, may be more valuable than its physical assets. This primer covers everything from establishing basic policies and procedures for IP protection. Read more ▶

 
 
Image: Why we can't stop botnets

Why we can't stop botnets

A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations. Read more ▶

Image: Best security software, 2019: Lab-tested reviews of today's top tools

Best security software, 2019: Lab-tested reviews of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: Hottest new cybersecurity products at RSA 2019

Hottest new cybersecurity products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

White Paper: Circonus

Monitoring in a DevOps World

Theo Schlossnagle discusses the most important trends of DevOps. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.