CSO

CSO Daily

September 11, 2019

Image: New NetCAT CPU side-channel vulnerability exploitable over the network

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks. Read more ▶

Your Must-Read Stories

•

Security and compliance considerations for Microsoft Teams

•

Why every business should consider ISO 27701 compliance for their vendors

•

How a small business should respond to a hack

•

2fa explained: How to enable it and how it works

•

Top mobile VPNs for the enterprise

•

8 hot IT security jobs and what they pay

eBook: Zscaler

Office 365 Deployment Survey - How do you measure with your peers?

The top reason enterprises are migrating to Office 365 is to attempt to reduce the complexity of their IT environment. Ultimately, Office 365 is intended to accelerate and support collaboration to foster innovation and competitiveness—this is what companies are craving, but they need the right infrastructure to deliver on that promise. Read more ▶

Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: Why every business should consider ISO 27701 compliance for their vendors

Why every business should consider ISO 27701 compliance for their vendors

The new standard provide a comprehensive set of controls for information security and the protection of personal information. Read more ▶

 
 
Image: How a small business should respond to a hack

How a small business should respond to a hack

With small business finding itself in hackers’ crosshairs as much as the big boys, it’s imperative to have an immediate response plan in the event of an attack. Read more ▶

Image: 2fa explained: How to enable it and how it works

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online service. Read more ▶

Image: Top mobile VPNs for the enterprise

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need. Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

Miscellaneous: FireEye

The SIEM That Cried Wolf

Check out this infographic and learn how to enhance your SIEM and move from alert to fix faster. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.