CSO

CSO Daily

February 12, 2019

Image: Why collecting biometric data is risky

Why collecting biometric data is risky

Biometric authentication has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect. Read more ▶

Your Must-Read Stories

•

HP gives software robots their own IDs to audit their activities

•

The three most important ways to defend against security threats

•

Android phones can be hacked remotely by viewing malicious PNG image

•

How to protect backups from ransomware

•

The new CISO's playbook: 5 rules to follow

•

I can get and crack your password hashes from email

White Paper: One Identity

10 steps to cleaning up Active Directory -- and keeping them that way

In this document, you will discover 10 steps you can take to remediate user account problems in AD and to prevent them from occurring in the future. Read more ▶

Image: HP gives software robots their own IDs to audit their activities

HP gives software robots their own IDs to audit their activities

What are your robots up to? HP's new in-house Digital ID for software robots, a CSO50 award winner, makes it easier to keep track of robotic process automation (RPA). Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: The three most important ways to defend against security threats

The three most important ways to defend against security threats

Patching, security training programs and password management will thwart attacks more effectively than anything else. You're already doing them. Here's how to do them better. Read more ▶

 
 
Image: Android phones can be hacked remotely by viewing malicious PNG image

Android phones can be hacked remotely by viewing malicious PNG image

Android users are being told to patch their Android OS Nougat (7.0), Oreo (8.0) and Pie (9.0) as soon as updates are available after a bug related to PNG images was found. Read more ▶

Image: How to protect backups from ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: I can get and crack your password hashes from email

I can get and crack your password hashes from email

Malicious hackers can use a simple trick to get your Windows computer to authenticate to a remote server that captures your password hash — just by sending you an email. Take these steps to test for the vulnerability. Read more ▶

White Paper: One Identity

8 Best Practices for Identity and Access Management

Too often, IT is placed in the role of “gatekeeper” simply because only IT has the tools needed to manage identity. But with the right identity management tools in place, IT maintains the tools and infrastructure, and the business controls the actual identities. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].