CSO

CSO Update

April 11, 2019

Image: 6 ways to fight deploy and decay

6 ways to fight deploy and decay

Even your best security controls will weaken over time after deployment, much to hackers' delight. Take these steps to slow down or get ahead of that decay. Read more ▶

Your Must-Read Stories

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Google expands cloud security capabilities, including simpler configuration

How and when to set Windows logging to UTC time

5 ways to curb cybersecurity burnout

The 6 biggest ransomware attacks of the last 5 years

eBook: DCi, HP Gold Partner

Experience the Exceptional HP Elite PCs

This guide explores the superior design features, next-level security, and insightful management and collaboration tools that HP Elite PCs bring to the table, plus a detailed look into the specs and accessories available with the solutions. All this and more are available through DCi Technology Solutions, an HP Gold Partner. Read more ▶

Image: New TajMahal APT discovered by Kaspersky has one known victim, likely others

New TajMahal APT discovered by Kaspersky has one known victim, likely others

Active since August 2014 with 80 modules able to capture a variety of information but with only one known victim, the TajMahal APT seems too advanced not to be used just once. Read more ▶

Image: You Can Now Get This Award-Winning VPN For Just $1/month

FROM OUR BUSINESS PARTNERS

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cybercrime groups raise the bar for security teams by borrowing APT techniques

Cyber criminals now have access to more nation-state technology to launch more sophisticated advanced persistent threat attacks. That's bad news for defenders. Read more ▶

 
 
Image: Google expands cloud security capabilities, including simpler configuration

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications. Read more ▶

Image: How and when to set Windows logging to UTC time

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more ▶

Image: 5 ways to curb cybersecurity burnout

5 ways to curb cybersecurity burnout

91% of CISOs suffer 'moderate or high' levels of stress. Here are some ways to help. Read more ▶

Image: The 6 biggest ransomware attacks of the last 5 years

The 6 biggest ransomware attacks of the last 5 years

The biggest ransomware attacks illustrate how this particularly nasty genre of attack software has grown from a curiosity and an annoyance to a major crisis. Read more ▶

Miscellaneous: Attronica, an HP Gold Partner

Advance Business Performance and Security With Powerful Notebooks

Read this solution brief to learn how HP EliteBook 700 Series G5 Notebooks can keep your mobile workers productive and well connected. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.