CSO

CSO Daily

June 04, 2019

Image: New tools automate phishing attacks that bypass 2-factor authentication

New tools automate phishing attacks that bypass 2-factor authentication

Researchers released two tools--Muraen and NecroBrowser--that automate phishing attacks that can bypass 2FA. Most defenses won't stop them. Read more ▶

Your Must-Read Stories

•

How First Citrus Bank got rid of employee passwords

•

5 ways compliance hurts security

•

How to evaluate SOC-as-a-service providers

•

6 steps for building a robust incident response plan

•

Public SAP exploits could enable attacks against thousands of companies

•

4 tips for getting the most from threat intelligence

White Paper: Open Text

Safeguarding External Digital Data: Consider an ‘outside-in’ approach

In today’s connected world, data has no boundaries. Organizations depend on data flowing between partners, customers, suppliers and others. But what about security? This exclusive IDG study from OpenText shows 70% of large enterprises have serious concerns about the security of data accessed by external partners. Read the report to learn what you can do to assure both security and access to this essential data. Read more ▶

Image: How First Citrus Bank got rid of employee passwords

How First Citrus Bank got rid of employee passwords

The Florida bank rolled out passwordless authentication in February that relies on device biometrics of their smartphones. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: 5 ways compliance hurts security

5 ways compliance hurts security

The tasks of meeting regulatory requirements and providing true security that actually mitigates risk do not align. Here's how focusing exclusively on compliance can undermine security. Read more ▶

 
 
Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: 6 steps for building a robust incident response plan

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs. Read more ▶

Image: Public SAP exploits could enable attacks against thousands of companies

Public SAP exploits could enable attacks against thousands of companies

A recently released exploit takes advantage of a known configuration vulnerability that persists among many on-premise and cloud SAP instances. Here's what companies using SAP should do. Read more ▶

Image: 4 tips for getting the most from threat intelligence

4 tips for getting the most from threat intelligence

It’s easy to gather data on potential threats, but you have to know what to do with that intelligence if you want to improve your security stance. Read more ▶

Data Sheet: Enterprise Cyber Security

ECSA: Architecture-as-a-Service / Architecture on Demand

At ECSA, we do architecture. That’s it. We don’t do IT management, IT Operations, or project management. We do one thing and we do it very well. Now, we want to provide you what we call “Architecture-as a-Service” or “Architecture on Demand”. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.