CSO

CSO Update

February 19, 2019

Image: 7 cheap or free cybersecurity training resources

7 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Your Must-Read Stories

Review: SlashNext is like shooting phish in a barrel

Top tools and resources for running a capture the flag competition

How to harden Windows 10 workstations and servers: Disable SMB v1

10 essential steps to improve your security posture

Bank OZK's vulnerability risk index shows patching priorities everyone understands

How polls are hacked: What every business should know

White Paper: M-Files Inc.

Best Practices Guide: How to Start, Manage and Implement an ECM Project

This guide works as a practical tool to remind you of topics and steps to consider when planning to implement an Enterprise Content Management solution like M-files. Read more ▶

Image: Review: SlashNext is like shooting phish in a barrel

Review: SlashNext is like shooting phish in a barrel

SlashNext is a dedicated platform for combating modern phishing attacks. It does that one thing and it does it very well. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: Top tools and resources for running a capture the flag competition

Top tools and resources for running a capture the flag competition

Capture the flag competitions can help improve security skills and identify talent. Use these tools and frameworks to design and run your own CTF event. Read more ▶

 
 
Image: How to harden Windows 10 workstations and servers: Disable SMB v1

How to harden Windows 10 workstations and servers: Disable SMB v1

Early versions of Server Message Block are still present on many Windows networks and devices, leaving them open to attack. Here's how to detect and disable them. Read more ▶

Image: 10 essential steps to improve your security posture

10 essential steps to improve your security posture

A strong security posture takes more than having the right defenses in place, you also need to establish solid plans to ensure you react to any breach in the right way. Read more ▶

Image: Bank OZK's vulnerability risk index shows patching priorities everyone understands

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric. Read more ▶

Image: How polls are hacked: What every business should know

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging. Read more ▶

White Paper: M-Files Inc.

How Intelligent Information Management Can Make Your Business More Competitive - 10 Tips for Selecting an ECM System

In today's competitive business climate, the key is to identify the data that is useful so that we can make informed decisions based on accurate, up-to-date information. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.