CSO

CSO Daily

August 28, 2019

Image: 7 steps to ensure your Azure backup works when you need it

7 steps to ensure your Azure backup works when you need it

Worried about ransomware attacks? The best thing you can do now is make sure your backup system is ready. Read more ▶

Your Must-Read Stories

•

Regional municipal ransomware attacks soar; MS-ISAC can help

•

4 takeaways from Black Hat 2019

•

How to avoid using RDP on Windows

•

12 things every computer security pro should know

•

How much should you spend on security?

•

7 mobile security threats you should take seriously in 2019

White Paper: Covercent

DOJ Guidelines Self-Assessment

How Does Your Compliance Program Stack Up? Read more ▶

Image: Regional municipal ransomware attacks soar; MS-ISAC can help

Regional municipal ransomware attacks soar; MS-ISAC can help

Recent regional ransomware attacks underscore the importance of information sharing among municipalities. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: 4 takeaways from Black Hat 2019

4 takeaways from Black Hat 2019

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses. Read more ▶

 
 
Image: How to avoid using RDP on Windows

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how. Read more ▶

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Image: 7 mobile security threats you should take seriously in 2019

7 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year. Read more ▶

White Paper: Akamai Technologies Inc

Phishing is No Longer Just Email: It’s Social

Despite years of publicity and millions of dollars in employee training, phishing remains the largest insider threat that organizations face. As many as 93% of IT security breaches are the direct result of some form of phishing, and 34% of all phishing attacks explicitly target enterprises. Employees unwittingly give up personal and corporate information to malicious actors every day. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.