CSO

CSO Daily

June 05, 2019

Image: 10 penetration testing tools the pros use

10 penetration testing tools the pros use

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses ... before attackers do. Read more ▶

Your Must-Read Stories

•

5 tips for globalizing security awareness training

•

How to set up password policies in Azure AD Password Protection

•

Phishing attacks that bypass 2-factor authentication are now easier to execute

•

Best new Windows 10 security features: Windows Sandbox, more update options

•

Public SAP exploits could enable attacks against thousands of companies

•

FREE Download: Get the Spring 2019 digital issue of CSO magazine

White Paper: VeloCloud, now part of VMware

Global SD-WAN Vendor Market Mid-Year Forecasts, 2018

The SD-WAN market is in the early growth stage of the product lifecycle. Key factors driving market adoption include: cost savings from efficient usage of private and public networks, ability to optimize hybrid cloud connectivity, and applicatio naware routing. Read more ▶

Image: 5 tips for globalizing security awareness training

5 tips for globalizing security awareness training

Global organizations face particular cultural and linguistic challenges when it comes to awareness training. Here's how 2 companies met that challenge and what you can learn from their experience. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to set up password policies in Azure AD Password Protection

How to set up password policies in Azure AD Password Protection

When was the last time you reviewed your password policy? It's probably time to update, and Microsoft Azure has a good tool to set up and manage that policy. Read more ▶

 
 
Image: Phishing attacks that bypass 2-factor authentication are now easier to execute

Phishing attacks that bypass 2-factor authentication are now easier to execute

Researchers released two tools--Muraen and NecroBrowser--that automate phishing attacks that can bypass 2FA. Most defenses won't stop them. Read more ▶

Image: Best new Windows 10 security features: Windows Sandbox, more update options

Best new Windows 10 security features: Windows Sandbox, more update options

Here's what you need to know about each security update to Windows 10 as they roll out from Microsoft. Now updated for the 1903 feature release. Read more ▶

Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Image: FREE Download: Get the Spring 2019 digital issue of CSO magazine

FREE Download: Get the Spring 2019 digital issue of CSO magazine

Learn how leading security organizations are rising to the cloud security challenge and finding new ways to protect data and assets. Read more ▶

eBook: Micro Strategies Inc.

Gain Operational Insight with Data Center Analytics

IT departments are challenged with pivoting from a reactive role to a proactive stance where operations problems are anticipated and solved. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.