CSO

CSO Daily

April 15, 2020

Image: How to lock down Remote Desktop Protocol servers

How to lock down Remote Desktop Protocol servers

Make sure you've made all the proper settings to secure RDP to best protect your Windows network when supporting remote workers. Read more ▶

Your Must-Read Stories

•

Trump administration moves to revoke China Telecom's US license on security grounds

•

Threat modeling explained: A process for anticipating cyber attacks

•

How to set up multifactor authentication for Office 365 users

•

5 steps to building an effective disaster preparedness plan

•

8 key security considerations for protecting remote workers

•

How CISOs can best assess geopolitical risk factors

Video/Webcast: EMA Analyst Research

ESM: the (r)evolution of ITSM

Get insights into EMA’s most recent research findings on enterprise service management (ESM) when you attend this live webinar. Read more ▶

Image: Trump administration moves to revoke China Telecom's US license on security grounds

Trump administration moves to revoke China Telecom's US license on security grounds

A legal filing claims China Telecom is in violation of federal and state cybersecurity and privacy laws, but evidence is redacted. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Threat modeling explained: A process for anticipating cyber attacks

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources. Read more ▶

 
 
Image: How to set up multifactor authentication for Office 365 users

How to set up multifactor authentication for Office 365 users

Requiring MFA for some or all Microsoft Office 365 users will better protect your network and email system from attacks. Read more ▶

Image: 5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one. Read more ▶

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Image: How CISOs can best assess geopolitical risk factors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors. Read more ▶

White Paper: Intel

Health Tech Takes Flight with VR

Just as pilots use VR-guided simulators to rehearse their flights, the same technology can reconstruct a patient’s 2D medical imaging into a 3-dimensional, 360-degree model. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com