CSO

CSO Daily

December 31, 2018

Image: The biggest data breaches of the 21st century

The biggest data breaches of the 21st century

Security practitioners weigh in on the worst data breaches in recent memory. Read more ▶

Your Must Read Stories

•

The biggest data breaches of the 21st century

•

The 6 best password managers

•

What is Wireshark? What this essential troubleshooting tool does and how to use it

•

Hacking smart buildings

•

How to reach that person who will click on anything

•

RDP attacks explained — and 7 tips for mitigating your exposure

•

Social engineering basics: How criminals take advantage of human behavior

eBook: Citrix Systems Inc

Delivering highly available networks for the distributed enterprise - Citrix SD-WAN on AWS

Cloud technology has revolutionized the way global businesses operate. The ability to provision and de-provision IT resources on-demand and at a global scale gives them the agility to better support distributed workforces. Cloud providers also provide native access to innovative and emerging technologies, giving businesses of all sizes a path to retire inefficient processes and systems and drive new value from their critical applications. Read more ▶

Image: The 6 best password managers

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: What is Wireshark? What this essential troubleshooting tool does and how to use it

What is Wireshark? What this essential troubleshooting tool does and how to use it

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets. Read more ▶

 
 
Image: Hacking smart buildings

Hacking smart buildings

Smart buildings are giant IoT devices begging to get hacked. A new report offers concrete advice on how to mitigate the risk to building automation and control systems (BACS). Read more ▶

Image: How to reach that person who will click on anything

How to reach that person who will click on anything

There's always that one person who falls for every phishing scam. This is how you break them of that habit. Read more ▶

Image: RDP attacks explained — and 7 tips for mitigating your exposure

RDP attacks explained — and 7 tips for mitigating your exposure

Microsoft's Remote Desktop Protocol has become a popular attack vector. Here's what you need to know about the threat. Read more ▶

Image: Social engineering basics: How criminals take advantage of human behavior

Social engineering basics: How criminals take advantage of human behavior

Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Here are answers to some frequently asked questions about social engineering, including the common tactics social engineers use and tips for ensuring your staff is on guard. Read more ▶

White Paper: Zscaler

The Survivor’s Guide to building an Office 365 network

From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.