CSO

CSO Update

May 02, 2019

Image: 9 types of malware and how to recognize them

9 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit Read more ▶

Your Must-Read Stories

Why unauthenticated SMS is a security risk

How to enable the Windows Potentially Unwanted Application (PUA) feature

Best Android antivirus? The top 13 tools

How to evaluate SOC-as-a-service providers

5 threat detection and response technologies are coming together

Why local governments are a hot target for cyberattacks

White Paper: Networking Technologies, a Hewlett Packard Enterprise Platinum Partner

A New Compute Experience for Hybrid IT Agility, Security, and Economic Control

Read this eBook to learn how HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors can help you better address hybrid IT, handle your diverse workload requirements, hand economic control back to you. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to enable the Windows Potentially Unwanted Application (PUA) feature

How to enable the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads. Read more ▶

 
 
Image: Best Android antivirus? The top 13 tools

Best Android antivirus? The top 13 tools

There are plenty of antivirus tools for Android. Here's how the top 13 measure up in protection, usability and features. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: 5 threat detection and response technologies are coming together

5 threat detection and response technologies are coming together

Organizations use too many disparate point tools to detect and respond to cyber threats in a timely manner. As a result, CISOs want tight integration and interoperability across five cybersecurity technologies. Read more ▶

Image: Why local governments are a hot target for cyberattacks

Why local governments are a hot target for cyberattacks

Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.