CSO

CSO Daily

February 11, 2019

Image: How polls are hacked: What every business should know

How polls are hacked: What every business should know

The recent revelation that Michael Cohen paid to rig a presidential primary poll underscores the risks they present to business. Here's how to identify and prevent poll rigging. Read more ▶

Your Must-Read Stories

•

CrowdStrike Store brings third-party endpoint security agents to its platform

•

Have we reached peak privacy? How good IAM and privacy can coexist

•

The new CISO's playbook: 5 rules to follow

•

How to defend Office 365 from spear-phishing attacks

•

5 signs you've been hit with an APT

•

Bank OZK's vulnerability risk index shows patching priorities everyone understands

White Paper: Dell EMC and Intel®

How to Select the Right Workstation for Graphics and Compute-Intensive Workloads

Find and configure the right workstation to achieve peak performance and get more for your dollar. Combine the right configuration selections with Dell Precision Optimizer software, which comes loaded on all new Dell Precision workstations with the Dell and third-party tested and certified software applications, and boost productivity, maximize performance and ensure that you have the best possible experience. Download this white paper from Dell EMC and Intel® to learn more. Read more ▶

Image: CrowdStrike Store brings third-party endpoint security agents to its platform

CrowdStrike Store brings third-party endpoint security agents to its platform

CrowdStrike will share data its cloud-based endpoint security platform collects to give customers more options while minimizing compatibility and performance concerns. Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: Have we reached peak privacy? How good IAM and privacy can coexist

Have we reached peak privacy? How good IAM and privacy can coexist

Why privacy needs to remain at the forefront of identity and access management. Read more ▶

 
 
Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: How to defend Office 365 from spear-phishing attacks

How to defend Office 365 from spear-phishing attacks

A recent successful zero-day Flash attack began with a spear-phishing email. These Windows 10 and Office 365 settings could have prevented it. Read more ▶

Image: 5 signs you've been hit with an APT

5 signs you've been hit with an APT

An advanced persistent threat (APT) is a cyberattack executed by criminals or nation-states with the intent to steal data or surveil systems over an extended time period. Here's how to know if you've been hit with one. Read more ▶

Image: Bank OZK's vulnerability risk index shows patching priorities everyone understands

Bank OZK's vulnerability risk index shows patching priorities everyone understands

Explaining vulnerability risk to non-technical executives can be hard. With his CSO50 award-winning Vulnerability Exception Risk Index, Bank OZK CISO Jason Cathey has devised a way to turn vulnerability data into a simple risk metric. Read more ▶

Miscellaneous: Bsquare

IoT: Enhancing Operations Through Intelligent Maintenance

This webinar will highlight how intelligent maintenance strategies help organizations realize broader operational benefits. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.