CSO

CSO Update

February 13, 2020

Image: How to fight hidden malware on Windows networks

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network. Read more ▶

Your Must-Read Stories

The 25 worst passwords of 2019, and 8 tips for improving password security

8 steps to being (almost) completely anonymous online

Cybersecurity in 2020: From secure code to defense in depth

Presidential campaigns taking email security more seriously--not so much at the local level

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

The CIA triad: Definition, components and examples

Video/Webcast: EMA Analyst Research

Navigating Modern Endpoint Management Complexities

This live webinar from EMA Research and Kaseya will deliver actionable guidance on how to navigate modern endpoint management challenges in order to simplify administration tasks, lower costs, improve end-user experiences, and meet organizational goals. Read more ▶

Image: The 25 worst passwords of 2019, and 8 tips for improving password security

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

 
 
Image: Cybersecurity in 2020: From secure code to defense in depth

Cybersecurity in 2020: From secure code to defense in depth

CIO, Computerworld, CSO, InfoWorld, and Network World tackle the hot security issues, from prioritizing risk to securing digital transformation. Read more ▶

Image: Presidential campaigns taking email security more seriously--not so much at the local level

Presidential campaigns taking email security more seriously--not so much at the local level

DMARC now protects the email domains for most U.S. presidential candidates, according to a new report, but local election bodies lag behind and are vulnerable to spoofing. Read more ▶

Image: More targeted, sophisticated and costly: Why ransomware might be your biggest threat

More targeted, sophisticated and costly: Why ransomware might be your biggest threat

Ransomware has matured and its threat level is now on par with APTs as attackers use better tools and learn from past mistakes. Read more ▶

Image: The CIA triad: Definition, components and examples

The CIA triad: Definition, components and examples

The CIA (Confidentiality, Integrity, Availability) triad is a widely used information security model that can guide an organization's efforts and policies aimed at keeping its data secure. Read more ▶

eBook: Zscaler

Redefining Secure Access to Private Applications

It's time for a new approach to application security. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com