CSO

CSO Update

October 15, 2019

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Your Must-Read Stories

The CISO's newest responsibility: Building trust

11 top cloud security threats

Equifax data breach FAQ: What happened, who was affected, what was the impact?

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

5 reasons users hate cybersecurity awareness training, and how to make them love it

Security Recruiter Directory

eBook: Insight

A navigation guide for Windows/SQL Server 2008 EOS

SQL Server and Windows Server 2008 EOS means Microsoft will no longer make product improvements, accept warranty claims, or provide security or non-security patches. Extended support is only available for limited time, at a steep price. You then face a decision: How will you respond to this new normal? Read more ▶

Image: The CISO's newest responsibility: Building trust

The CISO's newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: 11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

 
 
Image: Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact. Read more ▶

Image: 6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions. Read more ▶

Image: 5 reasons users hate cybersecurity awareness training, and how to make them love it

5 reasons users hate cybersecurity awareness training, and how to make them love it

If you want your security awareness training program to be effective, address these common user complaints. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

Video/Webcast: Insight

Build a Migration Roadmap for Windows/SQL Server 2008 End of Support (EOS)

Watch this webinar to understand your migration options available for Windows Server® and SQL Server® 2008. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.