CSO

CSO Update

April 21, 2020

Image: 8 video chat apps compared: Which is best for security?

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs? Read more ▶

Your Must-Read Stories

Google enters zero-trust market with BeyondCorp Remote Access offering

Mail-in ballots during COVID crisis necessary, but with risk says expert

RubyGems typosquatting attack hits Ruby developers with trojanized packages

10 markers of a great cybersecurity program

SOC analyst job description, salary, and certification

5 steps to create a security incident response plan

White Paper: Palo Alto Networks

Elements of Security Operations E-Book

Elements of Security Operations details the building blocks of simpler, more effective security operations, drawing from our experts' real-world experiences to help you build capabilities that deserve your confidence. You'll learn how you can simplify operations by integrating and consolidating tools and automate repetitive tasks to better use your analyst talent. Read more ▶

Image: Google enters zero-trust market with BeyondCorp Remote Access offering

Google enters zero-trust market with BeyondCorp Remote Access offering

Google makes its internal zero-trust access infrastructure available to anyone on a subscription basis as an alternative to VPNs. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Mail-in ballots during COVID crisis necessary, but with risk says expert

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed. Read more ▶

 
 
Image: RubyGems typosquatting attack hits Ruby developers with trojanized packages

RubyGems typosquatting attack hits Ruby developers with trojanized packages

Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures. Read more ▶

Image: 10 markers of a great cybersecurity program

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more ▶

Image: SOC analyst job description, salary, and certification

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. Read more ▶

Image: 5 steps to create a security incident response plan

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.) Read more ▶

White Paper: Palo Alto Networks

Gartner's Top 9 Security Trends in 2020

The relentless pace of digital business and ongoing transition to cloud are challenging traditional security approaches. Acting on these developments, security and risk management leaders can improve resilience, better support business objectives and elevate their organizational standing. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com