CSO

CSO Daily

May 09, 2019

Image: How to outwit attackers using two Windows registry settings

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access. Read more ▶

Your Must-Read Stories

•

What is opsec? A process for protecting critical information

•

FREE Download: Get the Spring 2019 digital issue of CSO magazine

•

12 tips for effectively presenting cybersecurity to the board

•

What is GPS spoofing? And how you can defend against it

•

How to get started using Ghidra, the free reverse engineering tool

•

8 cheap or free cybersecurity training resources

Video/Webcast: Cyara

The Changing Role of CX Testing in Digital Transformation

With new competition emerging every day, businesses are transforming themselves, and using software as a means to drive differentiation. Digital transformation has become a key initiative for businesses across the globe, and CX is ground zero. Read more ▶

Image: What is opsec? A process for protecting critical information

What is opsec? A process for protecting critical information

Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

 
 
Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: What is GPS spoofing? And how you can defend against it

What is GPS spoofing? And how you can defend against it

The U.S. Global Positioning System, part of a network of global navigation satellite systems (GNSS), is vulnerable to attacks that could disrupt many industries. Here's how it works and what you can do to mitigate its risk. Read more ▶

Image: How to get started using Ghidra, the free reverse engineering tool

How to get started using Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.) Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

White Paper: Iron Mountain

Are You Prepared to Recover from Ransomware and Other Cyberthreats?

Many financial services firms may lose access to data in the wake of cyberattacks and other modern threats. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].