CSO

CSO Daily

January 28, 2019

Image: Why America isn't prepared for a cyber attack on the energy grid

Why America isn't prepared for a cyber attack on the energy grid

The U.S. energy grid continues to be vulnerable to Aurora-like attacks that could cause blackouts lasting a year or more. Read more ▶

Your Must-Read Stories

•

Ursnif Trojan is back with fileless persistence

•

The state of supply chain attacks: Why you should be wary of third-party providers

•

How to enable audit logs in Microsoft Office 365

•

I can get and crack your password hashes from email

•

Review: GreatHorn offers a better way to secure enterprise email

•

Building your forensic analysis toolset

White Paper: Osterman Research

Why You Need Third Party Solutions for Office 365

his white papers discusses some of the gaps in Office 365 and why third-party solutions to supplement or replace some of the native capabilities in Office 365 is a good idea. Read more ▶

Image: Ursnif Trojan is back with fileless persistence

Ursnif Trojan is back with fileless persistence

Also known as Dreambot, this new variant can deploy GandCrab ransomware through Microsoft Word macros. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: The state of supply chain attacks: Why you should be wary of third-party providers

The state of supply chain attacks: Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk. Read more ▶

 
 
Image: How to enable audit logs in Microsoft Office 365

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more ▶

Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

Image: Review: GreatHorn offers a better way to secure enterprise email

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more ▶

Image: Building your forensic analysis toolset

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶

White Paper: Osterman Research

Addressing the Top 10 Security Issues Organizations Face

This white paper focuses on the Top 10 security threats facing organizations and what can be done to address them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.