CSO

CSO Daily

January 03, 2019

Image: 8 phishing emails and why you’ll fall for them (or not)

8 phishing emails and why you’ll fall for them (or not)

One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing. Read more ▶

Your Must Read Stories

•

8 phishing emails and why you’ll fall for them (or not)

•

How automation enables a proactive security culture at Bank of England

•

How to set Microsoft Office 365 ATP policies to block malicious URLs

•

Major US newspapers crippled by Ryuk ransomware attack

•

12 top SIEM tools rated and compared

•

Security operations activities to watch in 2019

•

7 warning signs of an insider threat

White Paper: Microsoft

6 Steps to Building a Holistic Security Strategy

Securing data and systems is a top priority for organizations. But meeting this challenge gets more difficult every day as attacks grow more sophisticated, employees use a wider array of devices and applications, and data flows into and out of your business in more ways. Read more ▶

Image: How automation enables a proactive security culture at Bank of England

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: How to set Microsoft Office 365 ATP policies to block malicious URLs

How to set Microsoft Office 365 ATP policies to block malicious URLs

Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook. Read more ▶

 
 
Image: Major US newspapers crippled by Ryuk ransomware attack

Major US newspapers crippled by Ryuk ransomware attack

All Tribune Publishing newspapers, as well as US-printed newspapers formerly part of Tribune, were hit with a cyber attack involving Ryuk ransomware. Read more ▶

Image: 12 top SIEM tools rated and compared

12 top SIEM tools rated and compared

Security information and event management tools are a core part of most companies' cyber defenses. Use this guide to find SIEM options that best match your needs. Read more ▶

Image: Security operations activities to watch in 2019

Security operations activities to watch in 2019

Open-source software and industry initiatives, such as MITRE ATT&CK framework and Apache Kafka, will contribute to security operations in 2019. Read more ▶

Image: 7 warning signs of an insider threat

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company. Read more ▶

White Paper: Microsoft

Crash Course in Azure Active Directory

Azure AD is Microsoft’s cloud-based directory and identity management service. It combines core directory services, advanced identity protection, and application access management. Azure AD delivers single sign-on (SSO) access to on-premises and cloud applications, helping users stay productive. Using Azure AD, developers can quickly integrate IAM into their applications. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.