CSO

CSO Update

June 13, 2019

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Your Must-Read Stories

•

How to disable basic authentication in Microsoft Office 365

•

CSO digital magazine: Seeding security in the cloud

•

Why the Huawei ban is bad for security

•

3 email security protocols that help prevent address spoofing: How to use them

•

Review: LogRhythm takes SIEM to the next level

•

Why unauthenticated SMS is a security risk

eBook: Hitachi Vantara

Foundations for Architecting Data Solutions

The basis for any successful data project is a clear understanding of what you’re tasked to build and then understanding the major items that you need to consider in order to design a solid solution. Read more ▶

Image: How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: CSO digital magazine: Seeding security in the cloud

CSO digital magazine: Seeding security in the cloud

Learn how CSO50 award-winning companies are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: Why the Huawei ban is bad for security

Why the Huawei ban is bad for security

Many believe the ban on exporting U.S. technology to Chinese company Huawei could hurt American tech vendors and do little to mitigate supply chain threats. Read more ▶

Image: 3 email security protocols that help prevent address spoofing: How to use them

3 email security protocols that help prevent address spoofing: How to use them

DMARC, DKIM and SPF will help cut down on malicious emails from spoofed addresses. Setting them up is easier than you think. Read more ▶

Image: Review: LogRhythm takes SIEM to the next level

Review: LogRhythm takes SIEM to the next level

LogRhythm Enterprise offers a lot of protection and assistance for finding and remediating threats … and sometimes even pre-threat actions. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Miscellaneous: Idaptive

The Forrester Wave™: Identity-As-A-Service (IDaaS) For Enterprise

In our 37-criterion evaluation of providers of identity-as-a-service (IDaaS) for enterprise, we identified the 10 most significant ones — Google, IBM, Idaptive, Microsoft, Okta, OneLogin, OpenText, Ping Identity, Secret Double Octopus, and Simeio Solutions — and researched, analyzed, and scored them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.