CSO

CSO Daily

June 14, 2019

Image: Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Rowhammer variant RAMBleed allows attackers to steal secrets from RAM

Unlike Rowhammer, which only allows for data corruption, the newly discovered RAMBleed vulnerability provides a way to grab data such as encryption keys from memory. Read more ▶

Your Must-Read Stories

•

What is PKI? And how it secures just about everything online

•

The CSO guide to top security conferences, 2019

•

Security shines at Cisco Live

•

How to implement and use the MITRE ATT&CK framework

•

Does your cyber insurance cover social engineering? Read the fine print

•

What should your company’s change password policy be?

White Paper: Palo Alto Networks

Zero Trust: The Strategic Approach to Stop Data Breaches

By embracing the Zero Trust model, organizations can position themselves for a future in which they are not in constant reactive mode to threats, but have cybersecurity built into their technologies, cultures and operations. Read more ▶

Image: What is PKI? And how it secures just about everything online

What is PKI? And how it secures just about everything online

Public key infrastructure (PKI) is a catch-all term for everything used to establish and manage public key encryption, one of the most common forms of internet encryption. It is baked into every web browser in use today to secure traffic across the public internet, but organizations can also deploy it to secure their internal communications. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

 
 
Image: Security shines at Cisco Live

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead. Read more ▶

Image: How to implement and use the MITRE ATT&CK framework

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

Image: Does your cyber insurance cover social engineering? Read the fine print

Does your cyber insurance cover social engineering? Read the fine print

Some cyber insurance policies will pay only a small fraction of damages if an attacker used social engineering. Here's how to estimate the risk. Read more ▶

Image: What should your company’s change password policy be?

What should your company’s change password policy be?

Microsoft's recent dropping of its maximum password age default renews the debate over forced password changes. Here's why you should continue to expire passwords. Read more ▶

White Paper: Palo Alto Networks

The Forrester Wave: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018

Palo Alto Networks® was recognized as a Leader in The Forrester Wave™: Zero Trust eXtended (ZTX) Ecosystem Providers, Q4 2018. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.