How-Tos

CSO  >  malware / virus / security threat / protective antivirus shield

Antivirus / virus alert / warning / security threats / protection from attack

How to configure Microsoft Defender for cloud-based attacks

Malware delivered through cloud services such as OneDrive or SharePoint will try to disable and evade Defender. These simple settings will help prevent that.

mobile security / threat detection / traffic analysis

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

youtube thumbnails template 021020
video

Reviewing software risks on your Windows network

Set aside some time to inventory and analyze the software and settings on your network to identify risks.

authentication

SAML explained: How this open standard enables single sign on

Security Assertion Markup Language (SAML) is a standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

youtube thumbnails template 021020
video

How to mitigate the Microsoft MSHTML remote code execution zero-day

A new zero-day vulnerability allows attackers to gain network access through Microsoft 365 documents. Here’s how to stop it.

Load More