CSO

CSO Update

December 18, 2018

Image: 13 data breach predictions for 2019

13 data breach predictions for 2019

How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions. Read more ▶

Your Must Read Stories

•

13 data breach predictions for 2019

•

Review: Continuous cybersecurity monitoring with CyCognito

•

Fear and loathing defending ICS security at DoE's CyberForce Competition

•

How to stop malicious email forwarding in Outlook

•

Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult?

•

What is a keylogger? How attackers can monitor everything you type

•

Best security software: How 25 cutting-edge tools tackle today's threats

White Paper: CDW & Microsoft

Changing the Way Users Work

The Modern Workforce Insight Report explores how the workforce is evolving. How it’s being shaped by both technology and culture, how companies are adapting and some of the challenges — and opportunities — that it presents. Read more ▶

Image: Review: Continuous cybersecurity monitoring with CyCognito

Review: Continuous cybersecurity monitoring with CyCognito

The CyCognito platform studies networks the same way that hackers do, from the outside with no help or internal bias inserted into the process. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Fear and loathing defending ICS security at DoE's CyberForce Competition

Fear and loathing defending ICS security at DoE's CyberForce Competition

Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative. Read more ▶

 
 
Image: How to stop malicious email forwarding in Outlook

How to stop malicious email forwarding in Outlook

Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages. Read more ▶

Image: Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult?

Embracing risk management elevates security pros to business leaders. Why do they still find it so difficult?

The transition from an “it’s all about security and protecting the crown jewels” to “we need to mitigate risk and embrace risk management” is a crucial step next step for the information security profession. Read more ▶

Image: What is a keylogger? How attackers can monitor everything you type

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks. Read more ▶

Image: Best security software: How 25 cutting-edge tools tackle today's threats

Best security software: How 25 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software. Read more ▶

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.