CSO

CSO Daily

October 30, 2019

Image: Credential stuffing explained: How to prevent, detect and defend against it

Credential stuffing explained: How to prevent, detect and defend against it

The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder form them to use credential stuffing. Read more ▶

Your Must-Read Stories

•

How to disable LLMNR in Windows Server

•

The security staffing problem isn't going away. Now what?

•

Why CSOs should take control of printer security

•

4 big changes coming to cybersecurity in 2020 and beyond

•

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

•

Review: How Avanan defends cloud-based email platforms

Video/Webcast: Open Text

Webcast: Enterprise Fax with Capture Technology is Key to Optimizing Workflows

Digital fax plays a pivotal role in enterprise workflows – a ole that is growing significantly, according to a new IDG MarketPulse survey. Read more ▶

Image: How to disable LLMNR in Windows Server

How to disable LLMNR in Windows Server

Link-Local Multicast Name Resolution is usually not needed in modern networks and leaves the door open to man-in-the-middle attacks. Here's how to shut it off. Read more ▶

Image: This 4-course VMware mastery bundle is on sale today for just $20

DEALPOST

This 4-course VMware mastery bundle is on sale today for just $20

The Ultimate VMware Mastery Bundle features 4 courses on virtualization concepts and how to deploy VMware. Read more ▶

Image: The security staffing problem isn't going away. Now what?

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more ▶

 
 
Image: Why CSOs should take control of printer security

Why CSOs should take control of printer security

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Image: 4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more ▶

Image: China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned? Read more ▶

Image: Review: How Avanan defends cloud-based email platforms

Review: How Avanan defends cloud-based email platforms

Avanan can catch the advanced threats that Microsoft, Google or other cloud-based email providers miss, identifying dangers like phishing, malware, data leakage and even full account takeovers. Read more ▶

White Paper: Veeam Software Corporation

Managing & Protecting Data: Considerations for Higher Education

Data management and protection services alleviate many of the complexities that organizations face today, while ensuring confidence in data availability and security Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.