CSO

CSO Update

January 08, 2019

Image: How Facebook's privacy woes might change the rules of the road in 2019

How Facebook's privacy woes might change the rules of the road in 2019

Following a string of data privacy and protection missteps, Facebook faces potential backlash from legislators and consumers that could affect all companies that process consumer data. Read more ▶

Your Must Read Stories

•

How Facebook's privacy woes might change the rules of the road in 2019

•

Review: AttackIQ FireDrill watches the watchers

•

5 steps to simple role-based access control (RBAC)

•

Best WordPress security: Top tools and best practices

•

How to set Microsoft Office 365 ATP policies to block malicious URLs

•

Managing identity and access management in uncertain times

•

6 reasons biometrics are bad authenticators (and 1 acceptable use)

eBook: GitHub

Secure software development strategy essentials

In this guide, you'll learn how to secure your engineering team's processes and provide the flexibility they need to do their best work. We'll also address the unique regulatory and technical challenges that software companies face and how GitHub can help. Read more ▶

Image: Review: AttackIQ FireDrill watches the watchers

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: 5 steps to simple role-based access control (RBAC)

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more ▶

 
 
Image: Best WordPress security: Top tools and best practices

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. Read more ▶

Image: How to set Microsoft Office 365 ATP policies to block malicious URLs

How to set Microsoft Office 365 ATP policies to block malicious URLs

Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook. Read more ▶

Image: Managing identity and access management in uncertain times

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most. Read more ▶

Image: 6 reasons biometrics are bad authenticators (and 1 acceptable use)

6 reasons biometrics are bad authenticators (and 1 acceptable use)

Biometrics-only authentication is inaccurate, hackable and far from foolproof. Read more ▶

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.