CSO

CSO Update

April 23, 2020

Image: How to check your Windows network for vulnerabilities

How to check your Windows network for vulnerabilities

If you've made significant changes to your network to support remote workers, it's time to review what you've done to make sure everything is locked down. Read more ▶

Your Must-Read Stories

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

Pharming explained: How attackers use fake websites to steal data

10 markers of a great cybersecurity program

Microsoft Threat Protection: What security and IT admins need to know

7 PSD2 questions every CISO should be prepared to answer

8 video chat apps compared: Which is best for security?

White Paper: Robin.io

Unlocking the Full Potential of Elastic Stack on Kubernetes

How to Choose the Right Automation and Management Platform for Your ELK Stack Deployment. Read more ▶

Image: Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

Legions of cybersecurity volunteers rally to protect hospitals during COVID-19 crisis

The COVID-19 Cyber Threat Intelligence League and other groups cooperate with the industry, law enforcement, and the government to prevent attacks on healthcare providers. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Pharming explained: How attackers use fake websites to steal data

Pharming explained: How attackers use fake websites to steal data

A pharming attack aims to redirect victims' web traffic away from their intended destination to a website controlled by threat actors to harvest information and spread malware. Read more ▶

 
 
Image: 10 markers of a great cybersecurity program

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more ▶

Image: Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection: What security and IT admins need to know

Microsoft Threat Protection can protect Windows systems and Office 365 users on many levels, but licensing requirements can be confusing. Read more ▶

Image: 7 PSD2 questions every CISO should be prepared to answer

7 PSD2 questions every CISO should be prepared to answer

The EU's recently updated Payment Services Directive has several requirements that affect security, such as stronger authentication for online payments. Read more ▶

Image: 8 video chat apps compared: Which is best for security?

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs? Read more ▶

Miscellaneous: Robin.io

Migrating from Cloud to Cloud-Native

Kubernetes Challenges and Opportunities. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com