Beware the IoT spy in your office or home via smart furniture, warns NSA

Email not displaying correctly? View it in your browser.

CSO

CSO Daily

Nov 01, 2018
Featured Image
INSIDER

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of security is all-too-easy to come by. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Beware the IoT spy in your office or home via smart furniture, warns NSA
Automating security at AWS: How Amazon Web Services operates with no SOC
Cybersecurity professional impressions on cloud-native security
How to build a multi-cloud security strategy
Top security enhancements in Windows Server 2019
Thumbnail Image

Beware the IoT spy in your office or home via smart furniture, warns NSA

NSA discussed potential security and privacy issues of connected office furniture. Read More

Thumbnail Image
INSIDER

Automating security at AWS: How Amazon Web Services operates with no SOC

Amazon Web Services CISO Stephen Schmidt explains the company's recipe for combining security automation with ways to get management and staff to take security seriously. Read More

Thumbnail Image

Cybersecurity professional impressions on cloud-native security

Organization use cloud-native security controls, but they really want central management for cloud security across heterogeneous clouds. Read More

Thumbnail Image
INSIDER

How to build a multi-cloud security strategy

A number of security best practices have emerged alongside the growth of the multi-cloud environment, security experts say, and there are several critical steps that all organizations should take as they develop their own security strategies. Read More

Thumbnail Image
INSIDER

Top security enhancements in Windows Server 2019

This new version of Windows Server offers several significant security upgrades over Server 2016, including tools to track ransomware and other malware, and to track lateral movement attacks. Read More

Editor’s Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 7 best practices for negotiating ransomware payments
3. Are long passphrases the answer to password problems?
4. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
5. Cybercriminals are using blockchain to improve security. Should you?
6. 5 hard truths every CISO should know
7. What it takes to be a security consultant

Get Security Smart

From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.