CSO

CSO Daily

July 18, 2019

Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

Your Must-Read Stories

•

Review: FireMon clears the clutter for network security policy management

•

How to outwit attackers using two Windows registry settings

•

Getting started with Ghidra, the free reverse engineering tool

•

Why GE consolidated its identity and access management infrastructure

•

How to conduct a proper GDPR audit: 4 key steps

•

Implementing and using the MITRE ATT&CK framework

eBook: Salesforce.com

The Age of the Customer-Centric CIO

In today’s Digital Age, companies that listen to their customers, are adept at solving those customers’ pain points, and deliver relevant and immersive experiences have the advantage. With customer-centricity rising to the top of the CEO agenda, the CIO is well positioned to lead the charge. Read more ▶

Image: Review: FireMon clears the clutter for network security policy management

Review: FireMon clears the clutter for network security policy management

A pioneer in the field of network security policy management, FireMon provides full visibility into networks and devices, and overlays that knowledge with the rules, platforms, hardware and programs designed to protect it. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to outwit attackers using two Windows registry settings

How to outwit attackers using two Windows registry settings

These Microsoft Windows registry settings will prevent attackers from scheduling tasks that will hide their activities or gain unauthorized access. Read more ▶

 
 
Image: Getting started with Ghidra, the free reverse engineering tool

Getting started with Ghidra, the free reverse engineering tool

The Ghidra reverse engineering tool is free to download and use and is a worthy alternative to incumbent IDA Pro. Here's what you need to know to get started. (Some assembly required.) Read more ▶

Image: Why GE consolidated its identity and access management infrastructure

Why GE consolidated its identity and access management infrastructure

A multi-year effort to centralize GE's IAM functionality has resulted in significant cost savings, improved onboarding and better ability to meet regulatory requirements. Read more ▶

Image: How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take. Read more ▶

Image: Implementing and using the MITRE ATT&CK framework

Implementing and using the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

White Paper: CBTS

The Solution to Removing Network- Related Barriers to Business Goals

As organizations evolve in the new digital era, the networks that drove their business forward in the past are now slowing them down. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].