CSO

CSO Daily

December 25, 2018

Image: 5 hard truths every CISO should know

5 hard truths every CISO should know

Security professionals ignore these truths at their own peril. The common theme across all five: Don't underestimate the risk of social engineering and poor patching policies. Read more ▶

Your Must Read Stories

•

5 hard truths every CISO should know

•

12 top web application firewalls compared

•

How to stop malicious email forwarding in Outlook

•

Review: GreatHorn detects the most carefully planned email attacks

•

Can cyber insurance cover acts of cyber terrorism?

•

What is WebAuthN? Possibly the answer to all web authentication

•

How and why to hire a CISO

eBook: Citrix Systems Inc

Delivering highly available networks for the distributed enterprise - Citrix SD-WAN on AWS

Cloud technology has revolutionized the way global businesses operate. The ability to provision and de-provision IT resources on-demand and at a global scale gives them the agility to better support distributed workforces. Cloud providers also provide native access to innovative and emerging technologies, giving businesses of all sizes a path to retire inefficient processes and systems and drive new value from their critical applications. Read more ▶

Image: 12 top web application firewalls compared

12 top web application firewalls compared

A web application firewall (WAF) is a critical component of an enterprise security infrastructure, providing a key security layer for web-facing applications and APIs. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: How to stop malicious email forwarding in Outlook

How to stop malicious email forwarding in Outlook

Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages. Read more ▶

 
 
Image: Review: GreatHorn detects the most carefully planned email attacks

Review: GreatHorn detects the most carefully planned email attacks

Its ability to unmask phishing and social engineering attacks based on context truly sets it apart. Read more ▶

Image: Can cyber insurance cover acts of cyber terrorism?

Can cyber insurance cover acts of cyber terrorism?

Cyber insurance policies do not typically cover physical destruction or loss of life, but the UK government-backed reinsurer, Pool Re, announced this year it will cover acts of cyber officially deemed "terrorism" by Her Majesty's Government. (Did you spot the catch?) Read more ▶

Image: What is WebAuthN? Possibly the answer to all web authentication

What is WebAuthN? Possibly the answer to all web authentication

With strong support from Google, Microsoft and other vendors, WebAuthN is poised to become a true standard for passwordless authentication over the web. Read more ▶

Image: How and why to hire a CISO

How and why to hire a CISO

If you haven't yet hired a chief information security officer, you're not alone. Here are the considerations for creating the position and making the hire. Read more ▶

White Paper: Zscaler

The Survivor’s Guide to building an Office 365 network

From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.