CSO

CSO Daily

March 05, 2019

Image: Hottest new products at RSA 2019

Hottest new products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. Read more ▶

Your Must-Read Stories

•

Google announces better, badder, bigger SIEM

•

3 ways to mitigate the risk of shadow IoT

•

What is Mimikatz? And how to defend against this password stealing tool

•

How to become an ethical hacker

•

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

•

Is the world ready for the next big ransomware attack?

White Paper: Logicalis

Nail Down Network Management First

One common goal is to embrace new opportunities. Learn how a strong network core can link your vital internal and external services. Read more ▶

Image: Google announces better, badder, bigger SIEM

Google announces better, badder, bigger SIEM

Google/Alphabet's Chronicle cybersecurity moonshot has a doozy of a mega-gargantuan SIEM with huge pluses--and minuses. Take note. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: 3 ways to mitigate the risk of shadow IoT

3 ways to mitigate the risk of shadow IoT

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk. Read more ▶

 
 
Image: What is Mimikatz? And how to defend against this password stealing tool

What is Mimikatz? And how to defend against this password stealing tool

Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Read more ▶

Image: How to become an ethical hacker

How to become an ethical hacker

Ethical hacking is legally breaking into computers and devices to test an organization's defenses. Here’s what ethical hacking entails and the certifications and training you need to become an ethical hacker. Read more ▶

Image: Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019. Read more ▶

Image: Is the world ready for the next big ransomware attack?

Is the world ready for the next big ransomware attack?

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating. Read more ▶

White Paper: Logicalis

Getting IoT Right:Tips for Successful IoT/Analytics Projects

Check out tips for Successful IoT/Analytics Projects here. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.