CSO

CSO Update

September 05, 2019

Image: Best Android antivirus? The top 12 tools

Best Android antivirus? The top 12 tools

There are plenty of antivirus tools for Android. Here's how the top 12 measure up in protection, usability and features. Read more ▶

Your Must-Read Stories

SMS-based provisioning messages enable advanced phishing on Android phones

How to disable legacy authentication in Microsoft Exchange to enable MFA

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

How secure are your AI and machine learning projects?

5 signs your security culture is toxic (and 5 ways to fix it)

White Paper: AWS & COGNIZANT

Building an Effective and Extensible Data & Analytics Operating Model

To keep pace with ever-present business and technology change and challenges, organizations need operating models built with a strong data and analytics foundation. Here's how your organization can build one, incorporating a range of key components and best practices to quickly realize business objectives. Read more ▶

Image: SMS-based provisioning messages enable advanced phishing on Android phones

SMS-based provisioning messages enable advanced phishing on Android phones

Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn't Just for the 1 Percent Read more ▶

Image: How to disable legacy authentication in Microsoft Exchange to enable MFA

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server. Read more ▶

 
 
Image: ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity. Read more ▶

Image: Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

Insecure virtual USB feature in Supermicro BMCs exposes servers to attack

Security researchers have found a way to attach virtual USB devices remotely to Supermicro servers, including over the internet, by abusing a feature in their baseband management controller software. Read more ▶

Image: How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk. Read more ▶

Image: 5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization. Read more ▶

Miscellaneous: Mesosphere

D2iQ: Your Partner In the Cloud Native Journey

Today's enterprise organizations have an unprecedented need for speed when it comes to selecting and deploying cloud native open source technologies. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.