CSO

CSO Daily

September 05, 2019

Image: SMS-based provisioning messages enable advanced phishing on Android phones

SMS-based provisioning messages enable advanced phishing on Android phones

Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed through the attacker's proxy. Read more ▶

Your Must-Read Stories

•

How UK enterprises might protect EU citizen data post-Brexit

•

What is phishing? How this cyber attack works and how to prevent it

•

How to disable legacy authentication in Microsoft Exchange to enable MFA

•

6 risk factors to know when hiring an MSSP

•

Marketing security: 8 tips for recruiting users to your cause

•

How much should you spend on security?

White Paper: AWS & COGNIZANT

Building an Effective and Extensible Data & Analytics Operating Model

To keep pace with ever-present business and technology change and challenges, organizations need operating models built with a strong data and analytics foundation. Here’s how your organization can build one, incorporating a range of key components and best practices to quickly realize business objectives. Read more ▶

Image: How UK enterprises might protect EU citizen data post-Brexit

How UK enterprises might protect EU citizen data post-Brexit

If and when the UK leaves the European Union, UK organisations will likely turn to standard contractual clauses to ensure data flows continue legally. But that could change. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

 
 
Image: How to disable legacy authentication in Microsoft Exchange to enable MFA

How to disable legacy authentication in Microsoft Exchange to enable MFA

Microsoft recommends enabling multi-factor authentication for Office 365. To do so, you must also disable basic or legacy authentication on Microsoft Exchange Server. Read more ▶

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Image: Marketing security: 8 tips for recruiting users to your cause

Marketing security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶

Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Miscellaneous: Mesosphere

D2iQ: Your Partner In the Cloud Native Journey

Today’s enterprise organizations have an unprecedented need for speed when it comes to selecting and deploying cloud native open source technologies. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.