CSO

CSO Update

December 16, 2018

Image: Top 10 worst password FAILS of 2018

Top 10 worst password FAILS of 2018

The worst password offenders this year have been revealed. Top on the list: Kanye West's on-TV reveal of his iPhone password of 000000. Read more ▶

Your Must Read Stories

•

Top 10 worst password FAILS of 2018

•

Best security software: How 25 cutting-edge tools tackle today's threats

•

Finally, a meaningful congressional report on stemming cybersecurity attacks

•

Review: How StackRox protects containers

•

How to prevent, detect and recover from cryptojacking

•

How to stop malicious email forwarding in Outlook

•

What is a keylogger? How attackers can monitor everything you type

White Paper: Jamf

A Comprehensive Guide: iPhone and iPad Management for Beginners Guide

There are no signs of Apple device growth slowing down in the enterprise. In fact, 3 out of 4 employees now choose an iPhone or iPad for their mobile device. Our guideon the basics of device management will help you enhance iPhone, iPad and iOS management skills. Read more ▶

Image: Best security software: How 25 cutting-edge tools tackle today's threats

Best security software: How 25 cutting-edge tools tackle today's threats

Lab tested reviews of the most innovative, useful and, arguably, best security software. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Finally, a meaningful congressional report on stemming cybersecurity attacks

Finally, a meaningful congressional report on stemming cybersecurity attacks

The Cybersecurity Strategy Report offers solutions to six problem areas in an effort to improve IT's ability to cope with today's cyber threat landscape. Read more ▶

 
 
Image: Review: How StackRox protects containers

Review: How StackRox protects containers

StackRox fully integrates with Kubernetes so that it touches all three phases of containerization deployment: the building of the containers, the deployment of them into the cloud infrastructure, and finally the running of those containers as they perform their intended functions. Read more ▶

Image: How to prevent, detect and recover from cryptojacking

How to prevent, detect and recover from cryptojacking

Criminals are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Here’s what you can do to stop it. Read more ▶

Image: How to stop malicious email forwarding in Outlook

How to stop malicious email forwarding in Outlook

Microsoft Office 365 administrators can use these settings to find and delete hidden rules attackers use to intercept Outlook email messages. Read more ▶

Image: What is a keylogger? How attackers can monitor everything you type

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks. Read more ▶

White Paper: Jamf

Best-of-Breed Enterprise Mac Management

This white paper examines how purpose-built management solutions are essential to a successful Apple strategy, and walks you through ways to properly deploy, manage and secure Apple devices in your organization. Read more ▶

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.