Winning the war for cybersecurity talent What is a false flag? How state-based hackers cover their tracks CSO Update January 09, 2020 Winning the war for cybersecurity talent Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality. Read more ▶ Your Must-Read Stories • What is a false flag? How state-based hackers cover their tracks • How to fix insecure LDAP binds to prevent exposed Windows admin credentials • Review: How Fugue protects cloud assets • How to stop email spoofing of parked domains • Protocol analyzers: Who needs them, and how to choose one • Backdoors and Breaches incident response card game makes tabletop exercises fun Miscellaneous: Insight Enterprises Replacing Remote Access VPN with Prisma Access This brief examines the shortcomings of remote access VPN, and offers an alternative with Prisma Access by Palo Alto Networks. Read more ▶ What is a false flag? How state-based hackers cover their tracks False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice. Read more ▶ DEALPOST This $387 Azure certification prep bundle is currently on sale for $29 Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶ How to fix insecure LDAP binds to prevent exposed Windows admin credentials Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem. Read more ▶ Review: How Fugue protects cloud assets The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud. Read more ▶ How to stop email spoofing of parked domains Publishing a DMARC record for unused domains is a good idea. Here's how. Read more ▶ Protocol analyzers: Who needs them, and how to choose one Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro. Read more ▶ Backdoors and Breaches incident response card game makes tabletop exercises fun New Backdoors and Breaches card game makes it easy to build a random, realistic incident as part of a tabletop exercise. Read more ▶ Miscellaneous: Insight Enterprises Branch Offices Go Directly to the Cloud There are numerous ways to equip branch offices with secure networking infrastructure. This brief looks at various strategies and introduces a new solution: Prisma Access by Palo Alto Networks. Read more ▶ Email not displaying correctly? View it in your browser You are currently subscribed to CSO Update as tuwanan.mono@blogger.com. Unsubscribe from this newsletter | Manage your email preferences | Subscribe | Privacy Policy Learn more about Please do not reply to this message. To contact someone directly, send an email to newsletters@idg.com. © 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com