CSO

CSO Daily

August 13, 2019

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Your Must-Read Stories

•

Review: How Perimeter 81 provides a near plug-and-play network security service

•

Built to scale: 5 tips for structuring your security organization for growth

•

Popular Avaya enterprise VoIP phones are vulnerable to hacking

•

31 hardware and firmware vulnerabilities: A guide to the threats

•

How attackers identify your organization's weakest links

•

The 6 best password managers

White Paper: Dell Technologies and Intel®

Cyber Resilient Security in 14th

As servers become more critical in a software-defined datacenter architecture, server security becomes the foundation of overall enterprise security. Servers must emphasize security at both the hardware and firmware level by leveraging an immutable Root-of-Trust that can be used to verify subsequent operations within the server. This establishes a chain of trust that extends throughout the server lifecycle, from deployment through maintenance to decommissioning. The 14th generation of PowerEdge servers deliver this chain of trust and combine it with comprehensive management tools to provide robust layers of security across hardware and firmware. Download this whitepaper from Dell EMC and Intel® to learn more. Read more ▶

Image: Review: How Perimeter 81 provides a near plug-and-play network security service

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

 
 
Image: Popular Avaya enterprise VoIP phones are vulnerable to hacking

Popular Avaya enterprise VoIP phones are vulnerable to hacking

Attackers can use the vulnerability to gain complete control of the phone. It underscores the risks of using old open-source code in IoT devices. Read more ▶

Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

Image: How attackers identify your organization's weakest links

How attackers identify your organization's weakest links

Understanding the techniques and tools attackers use in targeted phishing attacks. Read more ▶

Image: The 6 best password managers

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read more ▶

White Paper: Dell Technologies and Intel®

Maximize Your Storage Capacity with the Dell EMC Unity 550F All-Flash Array

Taking into account time and budgetary constraints, most organizations can’t afford to make mistakes about where and how they allocate resources for storage. This means storage solutions must be sourced and operate efficiently, as well as eliminate the top two challenges many IT leaders cite as hindrances to their infrastructure: aging equipment and inadequate storage capacity. Download this white paper from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.