CSO

CSO Update

June 06, 2019

Image: 5 tips for globalizing security awareness training

5 tips for globalizing security awareness training

Global organizations face particular cultural and linguistic challenges when it comes to awareness training. Here's how 2 companies met that challenge and what you can learn from their experience. Read more ▶

Your Must-Read Stories

•

How to stick it to LinkedIn romance scammers

•

Developing an information security decision-making matrix

•

10 penetration testing tools the pros use

•

What is Magecart? How this hacker group steals payment card data

•

How to set up password policies in Azure AD Password Protection

•

Mobile security threats you should take seriously in 2019

eBook: Forcepoint LLC

Three Ways to Secure Branch Sites

Distributed networks are the new reality of today’s mobile, global workforce. As organizations become more dispersed, they need holistic security programs across all sites to leverage the latest advances in IT and adopt cloud-based applications— while supporting greater user productivity. Read more ▶

Image: How to stick it to LinkedIn romance scammers

How to stick it to LinkedIn romance scammers

LinkedIn is becoming a popular channel for criminals to find victims for romance scams. Here's how to identify, report and block those scammers. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Developing an information security decision-making matrix

Developing an information security decision-making matrix

It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required. Read more ▶

 
 
Image: 10 penetration testing tools the pros use

10 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Image: What is Magecart? How this hacker group steals payment card data

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. Read more ▶

Image: How to set up password policies in Azure AD Password Protection

How to set up password policies in Azure AD Password Protection

When was the last time you reviewed your password policy? It's probably time to update, and Microsoft Azure has a good tool to set up and manage that policy. Read more ▶

Image: Mobile security threats you should take seriously in 2019

Mobile security threats you should take seriously in 2019

Mobile malware may grab the headlines, but every enterprise should have its eye on some more pressing mobile security threats. Download this FREE digital issue of CSO magazine to learn more. Read more ▶

eBook: Forcepoint LLC

Guide to Cloud Connectivity and Security in Distributed Networks

How to respond to the new imperatives facing your distributed organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.