CSO

CSO Update

August 22, 2019

Image: How to market security: 8 tips for recruiting users to your cause

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶

Your Must-Read Stories

How to avoid using RDP on Windows

Beware rogue email rules and forms

What is access control? A key component of data security

6 risk factors to know when hiring an MSSP

Safe travels: 7 best practices for protecting data at border crossings

Best antivirus software: 10 top tools

White Paper: Carbon Black

Cognitions of a Cybercriminal

Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior.Attackers are getting better at moving around inside systems without being detected. Read more ▶

Image: How to avoid using RDP on Windows

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it's time to stop using it where possible. Here's how. Read more ▶

Image: There's finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There's finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here's how to make sure you can detect it. Read more ▶

 
 
Image: What is access control? A key component of data security

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges. Read more ▶

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Image: Safe travels: 7 best practices for protecting data at border crossings

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more ▶

Image: Best antivirus software: 10 top tools

Best antivirus software: 10 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability. Read more ▶

Video/Webcast: EMA Analyst Research

Achieve IT Operations Success with a Unified Approach to Network Monitoring

Attend this webinar to learn how enterprises can improve network operations by adopting a unified network monitoring platform. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.