CSO

CSO Daily

April 15, 2019

Image: How to improve container security

How to improve container security

Securing your Docker and container infrastructure will take a combination of policies, explicit tools and careful examination of your apps. Here’s how to do it. Read more ▶

Your Must-Read Stories

•

Outside-the-box malware is getting more common, security researchers warn

•

6 ways to fight deploy and decay

•

What is Emotet? And how to guard against this persistent Trojan malware

•

Privacy violations involving FEMA contractor may be more widespread

•

5 ways to curb cybersecurity burnout

•

How and when to set Windows logging to UTC time

White Paper: CDW & PaloAlto

Managing Risk

What makes cybersecurity so elusive for so many is the shifting nature of risk. Security is a journey, not a destination — and that journey has been made more complex by several factors. Check out managing risks here. Read more ▶

Image: Outside-the-box malware is getting more common, security researchers warn

Outside-the-box malware is getting more common, security researchers warn

Malware authors have been experimenting with unusual malware formats, and this presents new challenges for the security industry. Read more ▶

Image: You Can Now Get This Award-Winning VPN For Just $1/month

FROM OUR BUSINESS PARTNERS

You Can Now Get This Award-Winning VPN For Just $1/month

With Ivacy VPN, you can finally browse and stream securely and lag-free. Get complete peace-of-mind while you surf the web with its built-in security and anonymity features. Read more ▶

Image: 6 ways to fight deploy and decay

6 ways to fight deploy and decay

Even your best security controls will weaken over time after deployment, much to hackers' delight. Take these steps to slow down or get ahead of that decay. Read more ▶

 
 
Image: What is Emotet? And how to guard against this persistent Trojan malware

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here's what you can do to safeguard your business. Read more ▶

Image: Privacy violations involving FEMA contractor may be more widespread

Privacy violations involving FEMA contractor may be more widespread

Corporate Lodging Consultants provides lodging services to many other government agencies. Is more sensitive personal information at risk? Read more ▶

Image: 5 ways to curb cybersecurity burnout

5 ways to curb cybersecurity burnout

91% of CISOs suffer ‘moderate or high’ levels of stress. Here are some ways to help. Read more ▶

Image: How and when to set Windows logging to UTC time

How and when to set Windows logging to UTC time

As networks become more distributed and cloud-based, you should consider changing servers to UTC time to ensure proper syncing. This will help with forensics investigations. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.