CSO

CSO Daily

January 18, 2019

Image: Rocke coinminer disables cloud protection agents

Rocke coinminer disables cloud protection agents

Cryptojacker's new shell script A7 can remove cloud security agents from Alibaba and Tencent to avoid coinminer detection. Read more ▶

Your Must-Read Stories

•

I can get and crack your password hashes from email

•

Building your forensic analysis toolset

•

Three encrypted Slack alternatives worth a look

•

How to enable audit logs in Microsoft Office 365

•

Why AI-based threat detection hasn’t taken over the market … yet

•

New CISO appointments, January 2019

Video/Webcast: Nutanix

Fix that Leak: Managing Budgets in a Multi—Cloud World

To respond to business demands with increased agility, enterprises are moving their apps and workloads to both public and private clouds. But public cloud cost leaks have become the bane of budget management. Read more ▶

Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

Image: Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

FROM OUR BUSINESS PARTNERS

Hook Up Your Business with Award-Winning Video Conferencing For As Little As $19.99/mo

RingCentral offers comprehensive, affordable packages for any size organization, and you can set it up in minutes for as low as $19.99 per month. Read more ▶

Image: Building your forensic analysis toolset

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶

 
 
Image: Three encrypted Slack alternatives worth a look

Three encrypted Slack alternatives worth a look

Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private. Read more ▶

Image: How to enable audit logs in Microsoft Office 365

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more ▶

Image: Why AI-based threat detection hasn’t taken over the market … yet

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more ▶

Image: New CISO appointments, January 2019

New CISO appointments, January 2019

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read more ▶

White Paper: Bitsight Technologies

How to Protect Your Digital Supply Chain & Improve TPRM

Download this white paper to learn how to protect your digital supply chain and create an effective third-party risk management program. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.