CSO

CSO Daily

September 12, 2019

Image: 6 biggest healthcare security threats for 2020

6 biggest healthcare security threats for 2020

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read more ▶

Your Must-Read Stories

•

The 5 CIS controls you should implement first

•

Implementing a successful cyber insurance program: Key steps and considerations

•

Top mobile VPNs for the enterprise

•

Security and compliance considerations for Microsoft Teams

•

New NetCAT CPU side-channel vulnerability exploitable over the network

•

Cloud security: Inside the shared responsibility model

White Paper: Ping Identity

The IT Director's Guide to Multi-Factor Authentication

Multi-factor authentication begins with the notion that you can and should provide multiple factors for authentication, not just a single static means. MFA goes beyond 2FA by requiring users to authenticate via two or more different authentication factors. Read more ▶

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: Implementing a successful cyber insurance program: Key steps and considerations

Implementing a successful cyber insurance program: Key steps and considerations

In a first, a Black Hat micro summit explains how insurers assess risk to write cyber insurance policies as more organizations seek to indemnify themselves against potential breach losses. Read more ▶

 
 
Image: Top mobile VPNs for the enterprise

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need. Read more ▶

Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: New NetCAT CPU side-channel vulnerability exploitable over the network

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks. Read more ▶

Image: Cloud security: Inside the shared responsibility model

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem. Read more ▶

White Paper: Getronics, a Hewlett Packard Enterprise Platinum Partner

Hyperconvergence: The Key to a Simple, Efficient Data Center

Read the White Paper to learn how HPE SimpliVity, powered by Intel® Xeon® Scalable processors, goes further with built-in deduplication, all-flash storage, backup software and data replication. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].