CSO

CSO Daily

April 13, 2020

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Your Must-Read Stories

•

AI-powered deception technology speeds deployment, improves results

•

14 real-world phishing examples — and how to recognize them

•

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

•

What are vulnerability scanners and how do they work?

•

Review: Ericom Shield extends zero trust to websites with browser isolation

•

8 steps to being (almost) completely anonymous online

eBook: Box

Get down to business with Box and Office 365

Banking operations are more complex than ever. Critical processes, like loans originations or M&A activities, depend on many third parties — partners, vendors, and your customers — and a variety of productivity apps. This often results in fragmented information and broken workflows. Read more ▶

Image: AI-powered deception technology speeds deployment, improves results

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: 14 real-world phishing examples — and how to recognize them

14 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

 
 
Image: Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now. Read more ▶

Image: What are vulnerability scanners and how do they work?

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Read more ▶

Image: Review: Ericom Shield extends zero trust to websites with browser isolation

Review: Ericom Shield extends zero trust to websites with browser isolation

Using Docker containers, Shield allows website content in while keeping malware out. Read more ▶

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

Miscellaneous: Netskope

Cloud and Threat Report

Read the report and get up to speed about new trends in cloud usage and cloud threats so you can better protect your business. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com