CSO

CSO Update

December 20, 2018

Image: 12 top SIEM tools rated and compared

12 top SIEM tools rated and compared

Security information and event management tools are a core part of most companies' cyber defenses. Use this guide to find SIEM options that best match your needs. Read more ▶

Your Must Read Stories

12 top SIEM tools rated and compared

Security Recruiter Directory

Maybe we have the cybersecurity we deserve

How to set up multifactor authentication for Office 365 users

Review: Continuous cybersecurity monitoring with CyCognito

How to end a romance scam

The 18 biggest data breaches of the 21st century

White Paper: CDW & Polycom

Changing the Way Users Work

The Modern Workforce Insight Report explores how the workforce is evolving. How it's being shaped by both technology and culture, how companies are adapting and some of the challenges — and opportunities — that it presents. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Maybe we have the cybersecurity we deserve

Maybe we have the cybersecurity we deserve

Companies have focused more on making the consumer recovery process from fraud and data breaches easier than on better security. Most people seem OK with that. Read more ▶

 
 
Image: How to set up multifactor authentication for Office 365 users

How to set up multifactor authentication for Office 365 users

Requiring MFA for some or all Microsoft Office 365 users will better protect your network and email system from attacks. Read more ▶

Image: Review: Continuous cybersecurity monitoring with CyCognito

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process. Read more ▶

Image: How to end a romance scam

How to end a romance scam

Use this two-part test to convince romance scam victims that their "true love" is a fraud. Read more ▶

Image: The 18 biggest data breaches of the 21st century

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory. Read more ▶

White Paper: CDW & Sophos

Managing Risk

What makes cybersecurity so elusive for so many is the shifting nature of risk. Security is a journey, not a destination — and that journey has been made more complex by several factors. Read more ▶

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.