CSO

CSO Daily

September 25, 2019

Image: 5 trends shaking up multi-factor authentication

5 trends shaking up multi-factor authentication

Perhaps the biggest surprise in our review of nine multi-factor authentication products is that physical tokens are making a comeback. Many IT managers were hoping that software-based tokens, which are easier to deploy and manage, would make hardware tokens extinct. Read more ▶

Your Must-Read Stories

•

How to migrate smartphone users to the Outlook app with Intune

•

Social engineering explained: How criminals exploit human behavior

•

Rich PII enables sophisticated impersonation attacks

•

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

•

What a security career will look like in five years

•

CISA’s Krebs seeks more measured approach to election security heading into 2020

eGuide: Keap

2019 Strategic Planning Kit

Grow your business with purpose. Read more ▶

Image: How to migrate smartphone users to the Outlook app with Intune

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Social engineering explained: How criminals exploit human behavior

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Read more ▶

 
 
Image: Rich PII enables sophisticated impersonation attacks

Rich PII enables sophisticated impersonation attacks

Hackers are now using rich personally identifying information, including device types and browser versions, cookies and web histories, and even voice recordings to gain account access or commit fraud. Read more ▶

Image: Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

Review: A fully autonomous cybersecurity platform? Cynet 360 comes close

The secret to the platform’s success is the deployment of fully autonomous agents that act as both sensors and threat remediators and are capable of taking actions on their own. Read more ▶

Image: What a security career will look like in five years

What a security career will look like in five years

Get ready for ‘BISOs’ in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way. Read more ▶

Image: CISA’s Krebs seeks more measured approach to election security heading into 2020

CISA’s Krebs seeks more measured approach to election security heading into 2020

The Cybersecurity and Infrastructure Security Agency director says overhyped concern is a problem, while election officials say they reap the benefits of improved communications. Read more ▶

eGuide: Keap

25 things every small business should automate

In this guide, you’ll learn about 25 things every small business should—and can—automate, and how automating processes is easier than you might think. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.