How to prove and fight online dating and romance scams

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 13, 2018
Featured Image

What's new in Windows 10 security features: The anti-ransomware edition

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for 1709, Fall Creators Edition. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to prove and fight online dating and romance scams
10 old-school security principles that (still) rule
Salted Hash Ep 18: Mobile security and privacy
Ask me anything: Insight Engines lets you talk your network into revealing threats
Apple, Cisco, Aon and Allianz partner in cyber risk management
Hacking security awareness: the program-changing magic of the advisory board

White Paper: Qubole Inc

5 Tips on Building a Big Data Culture

From hiring practices to self-service technology and employee empowerment, our 5 Tips on Building a Data-Driven Culture will set you on a path to become a truly data-driven organization -- one that uses data to start, continue, or conclude every single business decision, no matter how major or minor. Read More

Thumbnail Image

How to prove and fight online dating and romance scams

Friends and family of romance scam victims sometimes call on security pros to prove their online loves are not who they claim to be. Here's how to handle the case the right way. Read More

Thumbnail Image
INSIDER

10 old-school security principles that (still) rule

Oldies but goodies, these security tips have stood the test of time. Read More

Thumbnail Image

Salted Hash Ep 18: Mobile security and privacy

Everyone, from activists, journalists, CEOs, and politicians, walk around with a computer in their pocket, sometimes calling it a phone. This week on Salted Hash, we talk about mobile privacy and security with the founder of The Guardian Project, Nathan Freitas. Read More

Thumbnail Image
INSIDER

Ask me anything: Insight Engines lets you talk your network into revealing threats

Think of the Insight Engines tool as Google for network security, allowing natural language searches and returning honed information to answer each query. This comparison doesn't do the program justice, but is a good starting point for understanding how it works. Read More

Thumbnail Image

Apple, Cisco, Aon and Allianz partner in cyber risk management

Cyber risk is real but hard to protect against. To help organizations, Apple, Cisco, Aon, and Allianz have partnered to create a joint solution. Read More

Thumbnail Image

Hacking security awareness: the program-changing magic of the advisory board

Most successful company programs have a few common traits, one of them being an advisory board. Advisory boards can propel security awareness programs into uncharted levels of success, yet most programs today don't utilize this simple hack for success. Learn Jason's success implementing an advisory board and how you can see similar success with your own. Read More

White Paper: Veeam Software

All You Need to Know About Microsoft Windows Server 2016 Virtualization

This eBook will discuss Windows Server 2016 Virtualization, also known as Hyper-V 2016. Many Hyper-V components have evolved with each Microsoft release, and knowing this information is key to understanding the increased functionality and usability. Many of the new features require the basic usage of PowerShell. Read More

CSO Insider

1. 6 use cases for blockchain in security
2. 5 top machine learning use cases for security
3. What is personally identifiable information (PII)? How to protect it under GDPR
4. Top security certifications: Who they're for, what they cost, and which you need
5. 11 tips for prioritizing security spending

Editor's Picks

1. Cyber security jobs: Job descriptions, requirements and salaries for today's hottest roles
2. The best antivirus? Kaspersky leads in latest tests, but that's only part of the story
3. How to write a CISO job description
4. What is a botnet? And why they aren't going away anytime soon
5. The 5 types of cyber attack you're most likely to face
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.