CSO

CSO Daily

June 13, 2019

Image: Why the Huawei ban is bad for security

Why the Huawei ban is bad for security

Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats. Read more ▶

Your Must-Read Stories

•

3 email security protocols that help prevent address spoofing: How to use them

•

Is AI fundamental to the future of cybersecurity?

•

Review: LogRhythm takes SIEM to the next level

•

Will the US ever get serious about security and privacy?

•

6 ways malware can bypass endpoint protection

•

From phish to network compromise in two hours: How Carbanak operates

eBook: Hitachi Vantara

Foundations for Architecting Data Solutions

The basis for any successful data project is a clear understanding of what you’re tasked to build and then understanding the major items that you need to consider in order to design a solid solution. Read more ▶

Image: 3 email security protocols that help prevent address spoofing: How to use them

3 email security protocols that help prevent address spoofing: How to use them

DMARC, DKIM and SPF will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Is AI fundamental to the future of cybersecurity?

Is AI fundamental to the future of cybersecurity?

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools. Read more ▶

 
 
Image: Review: LogRhythm takes SIEM to the next level

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions. Read more ▶

Image: Will the US ever get serious about security and privacy?

Will the US ever get serious about security and privacy?

We have the ability to drastically reduce cybercrime. So why are we still failing? Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

Image: From phish to network compromise in two hours: How Carbanak operates

From phish to network compromise in two hours: How Carbanak operates

Cybercriminal group Carbanak has stolen hundreds of millions of dollars from financial institutions. Here's a detailed analysis by Bitdefender of an attack on one bank. Read more ▶

Miscellaneous: Idaptive

The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise

In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText, Ping Identity, Secret Double Octopus, and Simeio Solutions — and researched, analyzed, and scored them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.