How to protect your network from PowerShell exploits

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 25, 2018
Featured Image

You can’t protect what you can’t see

Visibility is a fundamental cybersecurity strategy to protect network assets and information. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to protect your network from PowerShell exploits
The victim notification conundrum
Mastering email security with DMARC, SPF and DKIM
Taking cybersecurity beyond a compliance-first approach
Building a cybersecurity strategic plan
Take a cue from Europe on making GDPR work

White Paper: Silver Peak Systems Inc

2018 Trends in SD-WAN

Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Read More

Thumbnail Image
INSIDER

How to protect your network from PowerShell exploits

PowerShell is a powerful and versatile tool for both Windows sysadmins and hackers, who use it to build malicious scripts that avoid detection. This advice will make it harder for them to do so. Read More

Thumbnail Image

The victim notification conundrum

Now is the time for the security ecosystem to take stronger action to identify and address compromised computers – sharing lists of known compromises and simply observing the problem is not enough Read More

Thumbnail Image
INSIDER

Mastering email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. Read More

Thumbnail Image

Taking cybersecurity beyond a compliance-first approach

A compliance first approach to security is fundamentally insecure. It's time for companies to change the mindset, go beyond simply meeting regulatory requirements and focus on truly protecting data. Read More

Thumbnail Image

Building a cybersecurity strategic plan

These types of plans are cybersecurity road maps that establish pathways an organization can follow to improve its overall risk management approach. Read More

Thumbnail Image

Take a cue from Europe on making GDPR work

GDPR compliance is not a customer-service proposition. To better understand GDPR, U.S. companies should adopt a European mindset. Read More

eBook: Silver Peak Systems Inc

6 Ways to Improve Your Network Security with SD-WAN

With the right SD-WAN solution, broadband internet service are secure enough for the enterprise. Read this eBook to learn six ways to use a secure SD-WAN solution to improve network security and compliance. Read More

CSO Insider

1. GDPR and the "right to explanation"
2. The two most important ways to defend against security threats
3. 11 tips for prioritizing security spending
4. 7 threat modeling mistakes you’re probably making
5. Mastering email security with DMARC, SPF and DKIM

Editor's Picks

1. What is cryptojacking? How to prevent, detect, and recover from it
2. How to approach a Zero Trust security model for your enterprise
3. 4 reasons forensics will remain a pillar of cybersecurity
4. What’s new in Windows 10 security features: The anti-ransomware edition
5. Facebook's free VPN acts like spyware to iOS users in the U.S.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.