CSO

CSO Update

September 08, 2019

Image: Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Director Anne Neuberger says her group will focus on ransomware, threats to US elections, and nation-state influence operations. Read more ▶

Your Must-Read Stories

How to disable legacy authentication in Microsoft Exchange to enable MFA

Are you taking third-party risk seriously enough?

Back to basics: How phishing works and how to prevent it

5 signs your security culture is toxic (and 5 ways to fix it)

ICS as a cloud service is coming: Will the benefits outweigh the risks?

What is Wireguard? Secure, simple VPN still in development

White Paper: AWS & COGNIZANT

Building an Effective and Extensible Data & Analytics Operating Model

To keep pace with ever-present business and technology change and challenges, organizations need operating models built with a strong data and analytics foundation. Here's how your organization can build one, incorporating a range of key components and best practices to quickly realize business objectives. Read more ▶

Image: How to disable legacy authentication in Microsoft Exchange to enable MFA

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn't Just for the 1 Percent Read more ▶

Image: Are you taking third-party risk seriously enough?

Are you taking third-party risk seriously enough?

Because third parties are often responsible for data breaches, your internal security standards must extend beyond your borders to cover vendors and other external partners. Read more ▶

 
 
Image: Back to basics: How phishing works and how to prevent it

Back to basics: How phishing works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

Image: 5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization. Read more ▶

Image: ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity. Read more ▶

Image: What is Wireguard? Secure, simple VPN still in development

What is Wireguard? Secure, simple VPN still in development

The Wireguard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise? Read more ▶

White Paper: Tenable

Predictive Prioritization: How to Focus on the Vulnerabilities That Matter Most

Overwhelmed by the number of vulnerabilities your team faces? Uncertain which cyber threats pose the greatest risk to your business? You're not alone. Cybersecurity leaders have been grappling with these challenges for years – and the problem keeps getting worse. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.