CSO

CSO Update

January 22, 2019

Image: Review: GreatHorn offers a better way to secure enterprise email

Review: GreatHorn offers a better way to secure enterprise email

GreatHorn takes a modern and highly effective approach to protecting enterprise email that goes well beyond the capabilities of legacy mail scanners. Read more ▶

Your Must-Read Stories

•

4 tips to mitigate Slack security risks

•

Why targeted email attacks are so difficult to stop

•

Harness the NIST CSF to boost your security and compliance

•

5 steps to simple role-based access control (RBAC)

•

Best WordPress security: Top tools and best practices

•

How to set Microsoft Office 365 ATP policies to block malicious URLs

White Paper: GoToMeeting

A Buyer's Guide to Software Built for the Future of Work

A transformation to a more globally dispersed, flexible and remote workforce is happening–in some companies more rapidly than others. Read more ▶

Image: 4 tips to mitigate Slack security risks

4 tips to mitigate Slack security risks

A Slack breach would be a nightmare in terms of exposed sensitive data. Here's how to lock down your Slack workspaces. Read more ▶

Image: Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

FROM OUR BUSINESS PARTNERS

Get 3 Years of NordVPN Service for Just $2.99 Per Month - Deal Alert

Safeguard yourself against snoops, and access blocked content with this no-log VPN service. NordVPN is just $2.99 per month for 3 years, if you sign up right now. Read more ▶

Image: Why targeted email attacks are so difficult to stop

Why targeted email attacks are so difficult to stop

A highly targeted form of phishing, spear phishing involves bespoke emails being sent to well-researched victims. It is hard to spot without close inspection and difficult to stop with technical controls alone. Read more ▶

 
 
Image: Harness the NIST CSF to boost your security and compliance

Harness the NIST CSF to boost your security and compliance

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. Read more ▶

Image: 5 steps to simple role-based access control (RBAC)

5 steps to simple role-based access control (RBAC)

RBAC is the idea of assigning system access to users based on their role in an organization. It's important to remember that not every employee needs a starring role. Read more ▶

Image: Best WordPress security: Top tools and best practices

Best WordPress security: Top tools and best practices

Poorly secured WordPress websites are a favorite hacker target. Use these tools and advice to keep them out. Read more ▶

Image: How to set Microsoft Office 365 ATP policies to block malicious URLs

How to set Microsoft Office 365 ATP policies to block malicious URLs

Windows Advanced Threat Protection allows admins to set link filters for email messages and attachments in Outlook. Read more ▶

Research/Infographic: GoToMeeting

Millennial's and Meetings: The Future of Collaboration

Millennials may be new to the modern work environment, but their fresh perspective is raising the bar on productivity. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].