CSO

CSO Daily

January 22, 2019

Image: 4 tips to mitigate Slack security risks

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more ▶

Your Must-Read Stories

•

Review: GreatHorn offers a better way to secure enterprise email

•

5 steps to simple role-based access control (RBAC)

•

How automation enables a proactive security culture at Bank of England

•

Building your forensic analysis toolset

•

Why AI-based threat detection hasn’t taken over the market … yet

•

How to enable audit logs in Microsoft Office 365

White Paper: GoToMeeting

A Buyer's Guide to Software Built for the Future of Work

A transformation to a more globally dispersed, flexible and remote workforce is happening–in some companies more rapidly than others. Read more ▶

Image: Review: GreatHorn offers a better way to secure enterprise email

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: 5 steps to simple role-based access control (RBAC)

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more ▶

 
 
Image: How automation enables a proactive security culture at Bank of England

How automation enables a proactive security culture at Bank of England

The Bank of England security team uses automation to build intellectual capital, freeing up time to be more proactive and to better explain security to business units. Read more ▶

Image: Building your forensic analysis toolset

Building your forensic analysis toolset

Every security team should have these types of digital forensics tools available. Many are free, and there are enough options to find one that suits your skills and approach. Read more ▶

Image: Why AI-based threat detection hasn’t taken over the market … yet

Why AI-based threat detection hasn’t taken over the market … yet

Vendors, analysts and buyers differ on why threat detection AI isn't more widely adopted, but they agree that it needs to provide better insight to its inner workings. Read more ▶

Image: How to enable audit logs in Microsoft Office 365

How to enable audit logs in Microsoft Office 365

Audit logging of Office 365 mail reads makes forensics investigations of attacks much easier. Here's how to make sure it's enabled. Read more ▶

Research/Infographic: GoToMeeting

Millennial's and Meetings: The Future of Collaboration

Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].