CSO

CSO Daily

May 27, 2019

Image: How to establish your business’s risk tolerance

How to establish your business’s risk tolerance

Knowing your business risk appetite allows you to align security efforts to the business needs, prioritizing resources and spending on those areas where organizational leaders have the least appetite for risk. Here's how to do it. Read more ▶

Your Must-Read Stories

•

2016 election hacking in Florida: Russian emails, hidden tracks

•

FREE Download: Get the Spring 2019 digital issue of CSO magazine

•

Why GE consolidated its identity and access management infrastructure

•

How to get started using Ghidra, the free reverse engineering tool

•

What is opsec? A process for protecting critical information

•

Act fast to recover assets after cyber fraud

White Paper: VMware

HR + IT: The Equation for Better Employee Experience

In a global survey of 6,400 HR and IT decision makers and employees, VMware and VansonBourne correlated factors of employee experience—like Mac/PC choice and ability to work remotely—with business growth and other success metrics. They also identified a need for HR and IT to partner in delivering this experience. Read more ▶

Image: 2016 election hacking in Florida: Russian emails, hidden tracks

2016 election hacking in Florida: Russian emails, hidden tracks

The Mueller Report says the Russians planted malware on at least one Florida county system, and Florida's governor announces that two counties were hacked in 2016. Experts believe the problem could be bigger. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: How to get started using Ghidra, the free reverse engineering tool

How to get started using Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.) Read more ▶

Image: What is opsec? A process for protecting critical information

What is opsec? A process for protecting critical information

Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. Read more ▶

Image: Act fast to recover assets after cyber fraud

Act fast to recover assets after cyber fraud

Here's what companies can do to recover lost assets in the wake of a data theft or a BEC scam. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.