CSO

CSO Update

November 19, 2019

Image: 10 ways to kill your security career

10 ways to kill your security career

A breach won't necessarily doom your career, but these missteps could hamper your professional ambitions. Read more ▶

Your Must-Read Stories

Why you should consider your managed service provider an insider threat

The CISO's newest responsibility: Building trust

9 top SAST and DAST tools

5 steps to a successful red team engagement

Stop ignoring printer security: It's time for CSOs to take control

Web payment card skimmers add anti-forensics capabilities

White Paper: Box

IDC MarketScape is in, and Box is a Leader

Today, more and more companies are seeing the power of the cloud to accelerate and transform their business. And with the realization that the old way of doing things no longer works, we've reached a tipping point. Cloud-based tools have brought agility, scalability, and innovation that are not only changing content-driven processes; they're fundamentally changing the entire business landscape. Read more ▶

Image: Why you should consider your managed service provider an insider threat

Why you should consider your managed service provider an insider threat

MSPs and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk. Read more ▶

Image: Truebill can help you manage your finances—and it's free to download

DEALPOST

Truebill can help you manage your finances—and it's free to download

Truebill makes it easy to track your monthly budget and lower unnecessary payments. Read more ▶

Image: The CISO's newest responsibility: Building trust

The CISO's newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind. Read more ▶

 
 
Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: 5 steps to a successful red team engagement

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more ▶

Image: Stop ignoring printer security: It's time for CSOs to take control

Stop ignoring printer security: It's time for CSOs to take control

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Image: Web payment card skimmers add anti-forensics capabilities

Web payment card skimmers add anti-forensics capabilities

The newly discovered Pipka script can delete itself from a website after execution, making it very difficult to detect. Read more ▶

White Paper: Box

Introducing Data Guardrails and Behavioral Analytics

This white paper from Securosis, an independent security research and advisory firm, covers two recent techniques for protecting your sensitive data — without getting in the way of your access to the data you need. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.