CSO

CSO Daily

November 27, 2019

Image: Review: How NeuVector protects containers throughout their lifecycle

Review: How NeuVector protects containers throughout their lifecycle

Most traditional security products have very little visibility into containers running in the cloud. NeuVector protects containers from within the containerized environment. Read more ▶

Your Must-Read Stories

•

8 cheap or free cybersecurity training resources

•

Has the quantum crypto break already happened?

•

Global threat groups pose new political and economic dangers

•

A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

•

How a bank got hacked (a study in how not to secure your networks)

•

How and why deepfake videos work — and what is at risk

Research/Infographic: PerimeterX

Third-Party Code: The Hidden Risk in Your Website

Read the white paper to learn how you can manage risk from third-party code and better protect your applications. Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: Has the quantum crypto break already happened?

Has the quantum crypto break already happened?

Better quantum algorithms and a strange silence since last year from quantum computing researchers suggest that we are closer to breaking traditional encryption than most people believe. Read more ▶

 
 
Image: Global threat groups pose new political and economic dangers

Global threat groups pose new political and economic dangers

Nation-state players in Iran, North Korea, Saudi Arabia and Russia are getting new objectives and changing strategies, say experts. Read more ▶

Image: A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet

In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world. Read more ▶

Image: How a bank got hacked (a study in how not to secure your networks)

How a bank got hacked (a study in how not to secure your networks)

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more ▶

Image: How and why deepfake videos work — and what is at risk

How and why deepfake videos work — and what is at risk

Once the bailiwick of Hollywood special effects studios with multi-million-dollar budgets, now anyone can download deepfake software and use machine learning to make believable fake videos. This makes a lot of people nervous. Read more ▶

Case Study: PerimeterX

Crunchbase relies on PerimeterX to Block Bots and Optimize Customer Experience

Crunchbase relies of PerimeterX to Block Bots and Optimize Customer Experience. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.