CSO

CSO Update

March 21, 2019

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Your Must-Read Stories

SoftNAS Cloud 0day found: Upgrade ASAP

How to audit Windows Task Scheduler for cyber-attack activity

Best Android antivirus? The top 11 tools

12 tips for effectively presenting cybersecurity to the board

3 ways to monitor encrypted network traffic for malicious activity

What is malvertising? And how to protect against it

Miscellaneous: Dropbox

Learn Why Gartner Named Dropbox a Leader

The Gartner Magic Quadrant report will help you get a better understanding of the Content Collaboration Platforms market, compare vendors, and find the right solution for your business. Read more ▶

Image: SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud 0day found: Upgrade ASAP

SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: How to audit Windows Task Scheduler for cyber-attack activity

How to audit Windows Task Scheduler for cyber-attack activity

Two recently discovered Windows zero-day attacks underscore the importance of monitoring for unauthorized tasks. Read more ▶

 
 
Image: Best Android antivirus? The top 11 tools

Best Android antivirus? The top 11 tools

There are plenty of antivirus tools for Android. Here's how the top 11 measure up in protection, usability and features. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: 3 ways to monitor encrypted network traffic for malicious activity

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

Image: What is malvertising? And how to protect against it

What is malvertising? And how to protect against it

Malvertising, the practice of sprinkling malicious code to legitimate-looking ads, affects both small and large websites. Protecting against it is harder than it seems. Read more ▶

White Paper: Dropbox

The Art of Culture Hacking - Gartner

Gartner says, "What's the biggest barrier to change and transformation? According to CIOs, the resounding answer is culture, but that's not a very useful answer. Culture is big, unwieldy and hard to change. Most CIOs approach big change with big transformation efforts. We suggest you hack your culture instead" Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.