CSO

CSO Update

March 19, 2020

Image: Free security resources for work-from-home employees during the COVID-19 crisis

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home. Read more ▶

Your Must-Read Stories

Special report: Navigating the pandemic

6 ways attackers are exploiting the COVID-19 crisis

The 10 most powerful cybersecurity companies

Review: How ShiftLeft catches vulnerabilities during code development

6 security metrics that matter – and 4 that don't

How to prevent attackers from using Windows against you

Miscellaneous: Optiv & Palo Alto Networks

Ensure the Security of Remote Workers

Does Your Security Program Secure Your Company and All Your Remote Workers? Read more ▶

Image: Special report: Navigating the pandemic

Special report: Navigating the pandemic

Nearly every technology company — and almost every business — is desperately determining how to use its arsenal of technology to combat the increasingly severe disruption caused by coronavirus. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: 6 ways attackers are exploiting the COVID-19 crisis

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck. Read more ▶

 
 
Image: The 10 most powerful cybersecurity companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down. Read more ▶

Image: Review: How ShiftLeft catches vulnerabilities during code development

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process. Read more ▶

Image: 6 security metrics that matter – and 4 that don't

6 security metrics that matter – and 4 that don't

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more ▶

Image: How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute. Read more ▶

Data Sheet: Optiv & Palo Alto Networks

Set Up Your Secure Access Service Edge (SASE)

To stop cyberattacks, it's necessary to inspect all traffic. Anything short of full inspection of all traffic introduces a significant gap in security. Prisma Access consistently protects all traffic, on all ports and from all applications. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com