CSO

CSO Update

October 03, 2019

Image: Deepfakes and synthetic identity: More reasons to worry about identity theft

Deepfakes and synthetic identity: More reasons to worry about identity theft

How can we maintain control over digital identity In a world where it is being blurred and abused by fraudsters? Read more ▶

Your Must-Read Stories

•

Business email compromise attacks cost millions, losses doubling each year

•

How to create an effective security policy (and 4 templates to get you started)

•

How to protect and safely erase data on Windows devices

•

5 trends shaking up multi-factor authentication

•

Voting machine security: What to look for and what to look out for

•

Top cybersecurity masters degrees: Which is right for you?

Video/Webcast: Forcepoint LLC

United Data Protection for Hybrid IT

Learn more about how to embrace a risk-adaptive approach to data protection. Read more ▶

Image: Business email compromise attacks cost millions, losses doubling each year

Business email compromise attacks cost millions, losses doubling each year

Cybercriminals follow the money, and you need look no further than Toyota Boshoku's recent $37 million loss to see why many are turning to BEC scams. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: How to create an effective security policy (and 4 templates to get you started)

How to create an effective security policy (and 4 templates to get you started)

Download our ebook that features templates for security policies on passwords, acceptable use, email, access control, BYOD and incident response. Read more ▶

 
 
Image: How to protect and safely erase data on Windows devices

How to protect and safely erase data on Windows devices

Microsoft's BitLocker now uses AES encryption, but will default to the storage device's hardware encryption unless you make this setting, which will also allow you to easily sanitize drives. Read more ▶

Image: 5 trends shaking up multi-factor authentication

5 trends shaking up multi-factor authentication

Universal adoption of multi-factor authentication (MFA) is hindered by technical limitations and user resistance, but its use is growing. Here's why. Read more ▶

Image: Voting machine security: What to look for and what to look out for

Voting machine security: What to look for and what to look out for

The US Senate approved $250 million to help states purchase more secure voting equipment — but includes no provisions for what "secure" means. Our buying guide will help state election officials spend taxpayer money wisely. Read more ▶

Image: Top cybersecurity masters degrees: Which is right for you?

Top cybersecurity masters degrees: Which is right for you?

New cyber masters degrees are popping up all over the place. Here's our unscientific rundown of the top five. Read more ▶

Video/Webcast: Forcepoint LLC

Accelerate Cloud App Adoption without Compromising Security

How secure is your cloud data? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.