CSO

CSO Update

February 06, 2020

Image: 5 steps to avoid credential dumping attacks

5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks. Read more ▶

Your Must-Read Stories

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

6 tips for building your cybersecurity bench

Risk profiling gives PPD real-time view of vulnerabilities

9 CCPA questions every CISO should be prepared to answer

How one law firm made security a business development opportunity

7 security incidents that cost CISOs their jobs

White Paper: Flexera Software

Six Must-Do Steps to Modernize Your SAM

In this white paper you will discover the six critical shifts that ITAM and SAM teams must make to modernize and remain relevant in this new technology landscape. Read more ▶

Image: Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack. Read more ▶

Image: Arcadia makes supporting clean energy easier

DEALPOST

Arcadia makes supporting clean energy easier

Get a $20 Amazon gift card or 4 standard LED bulbs just by signing up. Read more ▶

Image: 6 tips for building your cybersecurity bench

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive. Read more ▶

 
 
Image: Risk profiling gives PPD real-time view of vulnerabilities

Risk profiling gives PPD real-time view of vulnerabilities

How drug development company PPD built its own risk profiling tool to give all stakeholders a simpler, clear view of risk associated with every IT asset. Read more ▶

Image: 9 CCPA questions every CISO should be prepared to answer

9 CCPA questions every CISO should be prepared to answer

Executive management anxiety over the California Consumer Privacy Act will rise as the enforcement deadline looms. Security managers will need to know the answers to these questions. Read more ▶

Image: How one law firm made security a business development opportunity

How one law firm made security a business development opportunity

Mark Walmsley, CISO at international law firm Freshfields, says a proactive approach to security helps the business win clients and gets its lawyers to embrace security. Read more ▶

Image: 7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity. Read more ▶

White Paper: Flexera Software

5 Ways to Integrate SaaS Into Your SAM Strategy

In this white paper: 5 Ways to Integrate SaaS Into Your SAM Strategy, you will learn about the "must-do's" that should be part of your Software Asset Management practice when implementing your SaaS plan. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com