CSO

CSO Daily

January 04, 2019

Image: 6 reasons biometrics are bad authenticators (and 1 acceptable use)

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof. Read more ▶

Your Must Read Stories

•

6 reasons biometrics are bad authenticators (and 1 acceptable use)

•

5 steps to simple role-based access control (RBAC)

•

Hacker posts ransom demand on Dublin's Luas tram system site

•

How to set up data loss prevention rules in Microsoft Office 365

•

Maybe we have the cybersecurity we deserve

•

Real life, why people escape it – and bringing them back

•

What the recent Facebook exposé can teach security leaders

White Paper: Salesforce.com

A New Level of Trust with Salesforce Shield

Protect your enterprise with point-and-click tools that enhance trust, transparency, compliance, and governance across all of your business-critical apps. See how you can gain: • Complete Visibility with Event Monitoring • Increased Compliance with Field Audit Trail • Added Protection with Platform Encryption Read more ▶

Image: 5 steps to simple role-based access control (RBAC)

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Hacker posts ransom demand on Dublin's Luas tram system site

Hacker posts ransom demand on Dublin's Luas tram system site

The website for Dublin’s tram system Luas was hacked, with the hacker threatening to leak the company’s private data if the ransom was not paid within the next five days. Read more ▶

 
 
Image: How to set up data loss prevention rules in Microsoft Office 365

How to set up data loss prevention rules in Microsoft Office 365

Most data leakage occurs via emai. Set Office 365 DLP policies to stop sensitive data from leaving your organization. Read more ▶

Image: Maybe we have the cybersecurity we deserve

Maybe we have the cybersecurity we deserve

Companies have focused more on making the consumer recovery process from fraud and data breaches easier than on better security. Most people seem OK with that. Read more ▶

Image: Real life, why people escape it – and bringing them back

Real life, why people escape it – and bringing them back

Security isn’t just about technology - that's only 10% of the total solution. Most of what we try and do is build awareness and communication between our team members and the rest of the company. And that requires being active social participants in the organization. Read more ▶

Image: What the recent Facebook exposé can teach security leaders

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals. Read more ▶

Case Study: Salesforce.com

Business Value of Building Apps on the Salesforce Lightning Platform

This independent IDC study examines businesses across industries that are using the Salesforce Lightning Platform for application development. Download this study and learn why building apps on Salesforce helps customers achieve: • 545% five-year ROI • 57% faster IT app development lifecycle • $3.74M higher annual revenue per organization Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.