CSO

CSO Update

March 26, 2019

Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

Your Must-Read Stories

How to report a data breach under GDPR

What is Metasploit? And how to use this popular hacking tool

Why AI fuzzing may be the next big cybersecurity threat

The new CISO's playbook: 5 rules to follow

The best password advice right now (Hint: It's not the NIST guidelines)

12 tips for effectively presenting cybersecurity to the board

Miscellaneous: Idaptive

Next-Gen Access and Zero Trust webinar

Join Andras Cser, VP Principal Analyst, Forrester and Corey Williams, VP of Product Marketing and Strategy, Idaptive for a webinar covering how the Zero Trust Extended model and a Next-Gen Access platform, not only bolster an organization's security posture but also improve end user experiences — all without sacrificing best-of-breed features. Read more ▶

Image: How to report a data breach under GDPR

How to report a data breach under GDPR

Data breach notification requirements are now mandatory and time-sensitive under GDPR. Here's what you need to report and who report it to. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: What is Metasploit? And how to use this popular hacking tool

What is Metasploit? And how to use this popular hacking tool

Metasploit is a widely used penetration testing tool that makes hacking way easier than it used to be. It has become an indispensable tool for both red team and blue team. Read more ▶

 
 
Image: Why AI fuzzing may be the next big cybersecurity threat

Why AI fuzzing may be the next big cybersecurity threat

Pairing artificial intelligence or machine learning with traditional fuzzing techniques creates a powerful tool to find application or system vulnerabilities — for both researchers and cyber criminals. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today's privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

White Paper: Softchoice Corporation

Mobilize Enterpise Data with Citrix Sharefile on Microsoft Azure

Enterprise file sync and sharing services help mobile workers who use multiple devices, such as smartphones and tablets, to optimize their productivity. Click here to find out how. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.