CSO

CSO Daily

May 22, 2019

Image: How to isolate a Windows 7 machine from your network

How to isolate a Windows 7 machine from your network

If you have a business reason to keep a Windows 7 system active past its 2020 end-of-life date, here's how to keep it from being a security liability on your network. Read more ▶

Your Must-Read Stories

•

FREE Download: Get the Spring 2019 digital issue of CSO magazine

•

15 real-world phishing examples — and how to recognize them

•

How to implement and use the MITRE ATT&CK framework

•

IT services giant HCL left employee passwords, other sensitive data exposed online

•

9 policies and procedures you need to know about if you’re starting a new security program

•

Why reported breaches are the tip of the iceberg

White Paper: Okta

A Modern Approach to Secure Server Access

Advanced Server Access is a modern approach to a common pain point - securing access to Linux and Windows machines via SSH and RDP. Learn how Okta’s revolutionary Zero Trust architecture eliminates the pain points around credential and shared account management, extending seamless Okta identity & access across your cloud infrastructure fleets for admin users and automated DevOps toolchains alike. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 15 real-world phishing examples — and how to recognize them

15 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

 
 
Image: How to implement and use the MITRE ATT&CK framework

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

Image: IT services giant HCL left employee passwords, other sensitive data exposed online

IT services giant HCL left employee passwords, other sensitive data exposed online

HCL left employee passwords, customer project details, and other sensitive information exposed online with no authentication. Read more ▶

Image: 9 policies and procedures you need to know about if you’re starting a new security program

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures. Read more ▶

Image: Why reported breaches are the tip of the iceberg

Why reported breaches are the tip of the iceberg

Thousands of businesses are breached every day without them even knowing it, compromising payment card data. The EMV chip isn’t the solution, but data devaluation can reduce the impact. Read more ▶

Video/Webcast: Open Text

Fuel Business Growth: A Modern Approach for Operational Excellence

IHS estimates that oil/gas data volumes are now exceeding 10TB of data per day for a single well. And with data coming from numerous systems, ranging from extract, translate and load systems to various analytics tools, data management is getting increasingly costly and complex. In this live webinar, we’ll examine strategies to overcome siloed information and disparate ERP systems and supplier/customer portals. Fuel operational excellence and business growth—register for the webinar today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.