CSO

CSO Update

January 14, 2020

Image: What is security's role in digital transformation?

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture. Read more ▶

Your Must-Read Stories

Hiring scarce security talent: 8 secrets to working with recruiters

Inspecting TLS-encrypted traffic with mitmproxy

Winning the war for cybersecurity talent

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

What is a false flag? How state-based hackers cover their tracks

The CSO guide to top security conferences, 2020

Miscellaneous: Akumina, Inc

Intranet Refresh Kit

We've compiled a set of resources to help you bring your intranet into the new decade. Download our Intranet Refresh Kit today and get access to everything you need to complete your project. Read more ▶

Image: Hiring scarce security talent: 8 secrets to working with recruiters

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: Inspecting TLS-encrypted traffic with mitmproxy

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to. Read more ▶

 
 
Image: Winning the war for cybersecurity talent

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality. Read more ▶

Image: How to fix insecure LDAP binds to prevent exposed Windows admin credentials

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem. Read more ▶

Image: What is a false flag? How state-based hackers cover their tracks

What is a false flag? How state-based hackers cover their tracks

False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice. Read more ▶

Image: The CSO guide to top security conferences, 2020

The CSO guide to top security conferences, 2020

CSO Online's calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

White Paper: Skillsoft

The Secret Sauce for Implementing Blockchain: Your Own People

This paper explores industry sectors and business models primed for disruption by blockchain and the ways in which it's already being incorporated by global industry leaders. CIOs must prepare to harness the distributed ledger's technology in the near future to remain competitive, and future-facing organizations are already investing in the people and processes to make blockchain work today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com