CSO

CSO Daily

January 17, 2019

Image: Building your forensic analysis toolset

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶

Your Must-Read Stories

•

I can get and crack your password hashes from email

•

6 reasons biometrics are bad authenticators (and 1 acceptable use)

•

How to set Microsoft Office 365 ATP policies to block malicious URLs

•

Best WordPress security: Top tools and best practices

•

Review: AttackIQ FireDrill watches the watchers

•

2 critical ways regulations and frameworks weaken cybersecurity

White Paper: Summit Partners, a Hewlett Packard Enterprise Platinum Partner

A New Compute Experience for Hybrid IT Agility, Security, and Economic Control

Download the eBook to learn how HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, and data center services from Summit Partners, a Hewlett Packard Enterprise Platinum Partner and trusted IT advisor, can help you better address hybrid IT, handle your diverse workload requirements, and hand economic control back to you. Read more ▶

Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: 6 reasons biometrics are bad authenticators (and 1 acceptable use)

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof. Read more ▶

 
 
Image: How to set Microsoft Office 365 ATP policies to block malicious URLs

How to set Microsoft Office 365 ATP policies to block malicious URLs

Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook. Read more ▶

Image: Best WordPress security: Top tools and best practices

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. Read more ▶

Image: Review: AttackIQ FireDrill watches the watchers

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses. Read more ▶

Image: 2 critical ways regulations and frameworks weaken cybersecurity

2 critical ways regulations and frameworks weaken cybersecurity

Security regulations and frameworks are good and necessary, but they can be inflexible and draw focus away from the most significant security risks. Read more ▶

White Paper: Micro Focus

Business Drivers for Data Privacy

With the arrival of major U.S. and international regulations that have touchpoints to data privacy, organizations must turn more attention to data discovery. They need to know what they’re storing digitally, exactly where that information resides, and how much of it is subject to which regulatory retention/preservation rules Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.