CSO

CSO Update

August 20, 2019

Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Your Must-Read Stories

•

6 risk factors to know when hiring an MSSP

•

More critical Remote Desktop flaws expose Windows systems to hacking

•

ICS security: Popular building management system vulnerable to takeover

•

How to check Privileged Identity management settings for Office 365

•

Beware rogue email rules and forms

•

The best and worst of Black Hat 2019

Miscellaneous: Citrix

Build & Grow with Citrix Ready

Citrix ready is a technology partner program that showcases verified products trusted to enhance Citrix solutions. Check out more here. Read more ▶

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: More critical Remote Desktop flaws expose Windows systems to hacking

More critical Remote Desktop flaws expose Windows systems to hacking

Microsoft finds and fixes multiple RDS and RDP vulnerabilities in Windows, but new research on BlueKeep patch rates suggests many machines could remain exposed. Read more ▶

 
 
Image: ICS security: Popular building management system vulnerable to takeover

ICS security: Popular building management system vulnerable to takeover

Remotely exploitable vulnerability in internet-connected devices gives attackers a means to cause disruption and damage in a wide range of industries. Read more ▶

Image: How to check Privileged Identity management settings for Office 365

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk. Read more ▶

Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it. Read more ▶

Image: The best and worst of Black Hat 2019

The best and worst of Black Hat 2019

Security rock stars? Fake science? This year's Black Hat had it all. Read more ▶

White Paper: Citrix

Citrix Ready, Set & Go! Customer satisfaction, confidence & marketshare

The Citrix Ready Program brings together Citrix verified products of our partners that enhance Citrix solutions. To your customer, the Citrix Ready designation represents the confidence and trust that comes with compatibility and partnership. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.