CSO

CSO Daily

July 25, 2019

Image: 15 signs you've been hacked -- and how to fight back

15 signs you've been hacked -- and how to fight back

Redirected internet searches, unexpected installs, rogue mouse pointers: Here's what to do when you've been 0wned. Read more ▶

Your Must-Read Stories

•

How to set up Microsoft Azure AD Identity Protection to spot risky users

•

31 hardware and firmware vulnerabilities: A guide to the threats

•

Hunting vintage MS-DOS viruses from Cuba to Pakistan

•

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

•

How to manage Microsoft's BitLocker encryption feature

•

Lack of trust will doom crytpocurrency

White Paper: Keysight Technologies

Get More from Your Monitoring Tools

Read our white paper, Get More from Your Performance Monitoring Tools, to learn how to boost monitoring efficiency. Get strategies for: • Managing increased traffic volume • Processing encrypted traffic • Accessing traffic in the cloud • Protecting quality at the network edge • Controlling operating costs Read more ▶

Image: How to set up Microsoft Azure AD Identity Protection to spot risky users

How to set up Microsoft Azure AD Identity Protection to spot risky users

Whichever license of Azure Active Directory you own, you have options to set up alerts and automate actions to risky user behavior. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

 
 
Image: Hunting vintage MS-DOS viruses from Cuba to Pakistan

Hunting vintage MS-DOS viruses from Cuba to Pakistan

Security researchers and enthusiasts try to understand and preserve the history of malware. Read more ▶

Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

Image: How to manage Microsoft's BitLocker encryption feature

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help. Read more ▶

Image: Lack of trust will doom crytpocurrency

Lack of trust will doom crytpocurrency

Loss of crypto coins through hacks, fake trading and volatility destroy trust in cryptocurrency, but those aren't its only problems. Read more ▶

White Paper: Komprise

Wait! There’s a Smarter Way… Grow your Data, Know your Data, Store your Data

Komprise and Cloudian offer a smarter way to manage today’s exponential unstructured data growth. Komprise’s analytics-driven data-management software enables you to quickly identify inactive data and easily move it to Cloudian HyperStore object storage. Komprise is fast and easy to install, with no storage agents or stubs to deal with. It works without creating performance degradation and can scale as needed to keep up with your data growth. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].