CSO

CSO Update

October 31, 2019

Image: The biggest data breach fines, penalties and settlements so far

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting. Read more ▶

Your Must-Read Stories

•

Attackers phish Office 365 users with fake voicemail messages

•

How to disable LLMNR in Windows Server

•

Credential stuffing explained: How to prevent, detect and defend against it

•

The security staffing problem isn't going away. Now what?

•

Cell phones don't belong in SCIFs, says Republican congressman

•

4 big changes coming to cybersecurity in 2020 and beyond

Miscellaneous: MicroAge, a Hewlett Packard Enterprise Platinum Solutions Provider

Add it up for success. HPE Small Business Solutions for Multi-function.

To extract the most value from their infrastructure investment, many small to medium businesses choose multi-function servers. Read more ▶

Image: Attackers phish Office 365 users with fake voicemail messages

Attackers phish Office 365 users with fake voicemail messages

Recent phishing campaigns have combined a clever use of fake voicemail, phony Microsoft email, and off-the-shelf phishing kits to target high-value victims. Read more ▶

Image: Set your brand up for success with a .tech domain extension

DEALPOST

Set your brand up for success with a .tech domain extension

Read more ▶

Image: How to disable LLMNR in Windows Server

How to disable LLMNR in Windows Server

Link-Local Multicast Name Resolution is usually not needed in modern networks and leaves the door open to man-in-the-middle attacks. Here's how to shut it off. Read more ▶

 
 
Image: Credential stuffing explained: How to prevent, detect and defend against it

Credential stuffing explained: How to prevent, detect and defend against it

The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder for them to use credential stuffing. Read more ▶

Image: The security staffing problem isn't going away. Now what?

The security staffing problem isn't going away. Now what?

6 strategies and tactics to adjust to a future characterized by higher levels of both vacancy and turnover. Read more ▶

Image: Cell phones don't belong in SCIFs, says Republican congressman

Cell phones don't belong in SCIFs, says Republican congressman

Rep. Mike Rogers says his phone was infected by Russian malware three years ago. Also, why he believes we need fewer federal cybersecurity agencies and election laws. Read more ▶

Image: 4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more ▶

White Paper: MicroAge, a Hewlett Packard Enterprise Platinum Solutions Provider

Silicon Root of Trust as a Cybersecurity Essential

HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, are configured with a silicon root of trust to detect and recover firmware from compromise or breach. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.