CSO

CSO Update

June 04, 2019

Image: How First Citrus Bank got rid of employee passwords

How First Citrus Bank got rid of employee passwords

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones. Read more ▶

Your Must-Read Stories

•

Phishing attacks that bypass 2-factor authentication are now easier to execute

•

10KBLAZE fallout: how businesses using SAP should respond

•

5 ways compliance hurts security

•

Best new Windows 10 security features: Windows Sandbox, more update options

•

Why businesses don’t report cybercrimes to law enforcement

•

4 tips for getting the most from threat intelligence

White Paper: Open Text

Safeguarding External Digital Data: Consider an ‘outside-in’ approach

In today’s connected world, data has no boundaries. Organizations depend on data flowing between partners, customers, suppliers and others. But what about security? This exclusive IDG study from OpenText shows 70% of large enterprises have serious concerns about the security of data accessed by external partners. Read the report to learn what you can do to assure both security and access to this essential data. Read more ▶

Image: Phishing attacks that bypass 2-factor authentication are now easier to execute

Phishing attacks that bypass 2-factor authentication are now easier to execute

Researchers released two tools--Muraen and NecroBrowser--that automate phishing attacks that can bypass 2FA. Most defenses won't stop them. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 10KBLAZE fallout: how businesses using SAP should respond

10KBLAZE fallout: how businesses using SAP should respond

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

 
 
Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

Image: Best new Windows 10 security features: Windows Sandbox, more update options

Best new Windows 10 security features: Windows Sandbox, more update options

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1903 feature release. Read more ▶

Image: Why businesses don’t report cybercrimes to law enforcement

Why businesses don’t report cybercrimes to law enforcement

Law enforcement agencies estimate the number of cybercrimes that go unreported by businesses number in the millions. Here why and when you should report breaches and other cyber attacks. Read more ▶

Image: 4 tips for getting the most from threat intelligence

4 tips for getting the most from threat intelligence

It’s easy to gather data on potential threats, but you have to know what to do with that intelligence if you want to improve your security stance. Read more ▶

Data Sheet: Enterprise Cyber Security

ECSA: Architecture-as-a-Service / Architecture on Demand

At ECSA, we do architecture. That’s it. We don’t do IT management, IT Operations, or project management. We do one thing and we do it very well. Now, we want to provide you what we call “Architecture-as a-Service” or “Architecture on Demand”. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.