CSO

CSO Daily

May 02, 2019

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

Your Must-Read Stories

•

9 types of malware and how to recognize them

•

How (and why) to build digital trust

•

Review: Aqua secures containers from development to production

•

Enabling the Windows Potentially Unwanted Application (PUA) feature

•

Does it matter who the CISO reports to?

•

Why local governments are a hot target for cyberattacks

White Paper: Networking Technologies, a Hewlett Packard Enterprise Platinum Partner

A New Compute Experience for Hybrid IT Agility, Security, and Economic Control

Read this eBook to learn how HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors can help you better address hybrid IT, handle your diverse workload requirements, hand economic control back to you. Read more ▶

Image: 9 types of malware and how to recognize them

9 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How (and why) to build digital trust

How (and why) to build digital trust

Earning customers' trust translates to better customer acquisition, greater customer loyalty and more revenue. Download this FREE digital issue of CSO magazine to learn how to do it. Read more ▶

 
 
Image: Review: Aqua secures containers from development to production

Review: Aqua secures containers from development to production

The Aqua Cloud Native Security Platform uses an inherent advantage of containers, the fact that they are always highly specialized for their jobs, to create a cybersecurity structure based on whitelisting. Read more ▶

Image: Enabling the Windows Potentially Unwanted Application (PUA) feature

Enabling the Windows Potentially Unwanted Application (PUA) feature

Turning on the PUA setting helps avoid users falling prey to malicious drive-by downloads. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Why local governments are a hot target for cyberattacks

Why local governments are a hot target for cyberattacks

Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].