CSO

CSO Daily

August 14, 2019

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Your Must-Read Stories

•

Developing personal OPSEC plans: 10 tips for protecting high-value targets

•

Review: How Perimeter 81 provides a near plug-and-play network security service

•

The biggest data breach fines, penalties and settlements so far

•

15 signs you've been hacked -- and how to fight back

•

How to set up Microsoft Azure AD Identity Protection to spot risky users

•

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Miscellaneous: Poly

Growth Opportunities for Video Conferencing in Huddle Rooms

Download the Frost & Sullivan analyst report to learn more about the growing need for productive huddle rooms and how to optimize them for your business. Read more ▶

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Review: How Perimeter 81 provides a near plug-and-play network security service

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand. Read more ▶

 
 
Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.23 billion and counting. Read more ▶

Image: 15 signs you've been hacked -- and how to fight back

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been hacked. Read more ▶

Image: How to set up Microsoft Azure AD Identity Protection to spot risky users

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior. Read more ▶

Image: Hunting vintage MS-DOS viruses from Cuba to Pakistan

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Security researchers and enthusiasts try to understand and preserve the history of malware. Read more ▶

eBook: Poly

All Your Employees Are Distracted

Download our eBook to learn more about what's really distracting your teams and what you can do to help. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.