CSO

CSO Update

April 14, 2020

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Your Must-Read Stories

•

5 steps to building an effective disaster preparedness plan

•

AI-powered deception technology speeds deployment, improves results

•

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

•

How CISOs can best assess geopolitical risk factors

•

14 real-world phishing examples — and how to recognize them

•

What are vulnerability scanners and how do they work?

White Paper: Intel

AI Building Blocks for a Self-Service Kiosk

Taking advantage of building blocks and streamlined models enables developers to build solutions in less time. Read more ▶

Image: 5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: AI-powered deception technology speeds deployment, improves results

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis. Read more ▶

 
 
Image: Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Beware malware-laden emails offering COVID-19 information, US Secret Service warns

Many of the emails take advantage of an unpatched, decades-old Microsoft Office vulnerability to deliver malware. Advice: Patch now. Read more ▶

Image: How CISOs can best assess geopolitical risk factors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors. Read more ▶

Image: 14 real-world phishing examples — and how to recognize them

14 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

Image: What are vulnerability scanners and how do they work?

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Read more ▶

White Paper: Intel

Health Tech Takes Flight with VR

Just as pilots use VR-guided simulators to rehearse their flights, the same technology can reconstruct a patient’s 2D medical imaging into a 3-dimensional, 360-degree model. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com