CSO

CSO Daily

March 28, 2019

Image: How to time-sync Windows systems

How to time-sync Windows systems

Incorrect time on a Windows device or server can prevent security updates or user authentication, and it can interfere with a forensics investigation. Read more ▶

Your Must-Read Stories

•

What your antivirus software doesn’t tell you, and how to get that data

•

Spyware explained: How it works and how to prevent it

•

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

•

How to hack a smartcard to gain privileged access

•

Windows security updates that require new registry keys

•

12 tips for effectively presenting cybersecurity to the board

eBook: ServiceNow

Now on Now Story: Taking charge of ServiceNow’s IT project portfolio

In this eBook, we explain the ServiceNow® IT Business Management (ITBM) journey–how we’ve transformed the way we manage our IT project portfolio to deliver predictable, high-value business outcomes. Read more ▶

Image: What your antivirus software doesn’t tell you, and how to get that data

What your antivirus software doesn’t tell you, and how to get that data

Antivirus software detects and removes malware, but how fast and how accurate? Here's no-cost way to find out and hold antivirus vendors accountable. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: Spyware explained: How it works and how to prevent it

Spyware explained: How it works and how to prevent it

Spyware is a broad category of malware designed to secretly observe activity on a device and send those observations to a snooper. It is used by everyone from nation states to jealous spouses. Read more ▶

 
 
Image: Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

Top 9 cybersecurity M&A deals of 2018 and 2019 (so far)

2018 was a busy year for mergers and acquisitions in the cybersecurity industry. Here's why the M&A market is so hot and what to expect in 2019. Read more ▶

Image: How to hack a smartcard to gain privileged access

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack. Read more ▶

Image: Windows security updates that require new registry keys

Windows security updates that require new registry keys

Don't assume automated Windows security updates are complete. You might need to add registry keys manually. Here are a few to check now. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

eBook: Veeam Software Corporation

Data Protection by the Numbers for Dummies

Veeam feels it’s critical for you to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.