CSO

CSO Daily

October 31, 2019

Image: Attackers phish Office 365 users with fake voicemail messages

Attackers phish Office 365 users with fake voicemail messages

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims. Read more ▶

Your Must-Read Stories

•

The biggest data breach fines, penalties and settlements so far

•

4 big changes coming to cybersecurity in 2020 and beyond

•

The security staffing problem isn't going away. Now what?

•

6 top OSINT tools: Find sensitive public info before hackers do

•

Stop ignoring printer security: It's time for CSOs to take control

•

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

Miscellaneous: MicroAge, a Hewlett Packard Enterprise Platinum Solutions Provider

Add it up for success. HPE Small Business Solutions for Multi-function.

To extract the most value from their infrastructure investment, many small to medium businesses choose multi-function servers. Read more ▶

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more ▶

Image: Set your brand up for success with a .tech domain extension

DEALPOST

Set your brand up for success with a .tech domain extension

Read more ▶

Image: 4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more ▶

 
 
Image: The security staffing problem isn't going away. Now what?

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more ▶

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: Stop ignoring printer security: It's time for CSOs to take control

Stop ignoring printer security: It's time for CSOs to take control

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Image: Compliance mandates, cybersecurity best practices dominate 2019 security priorities

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Read more ▶

White Paper: MicroAge, a Hewlett Packard Enterprise Platinum Solutions Provider

Silicon Root of Trust as a Cybersecurity Essential

HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, are configured with a silicon root of trust to detect and recover firmware from compromise or breach. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.