CSO

CSO Daily

December 26, 2019

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

Your Must-Read Stories

•

Security software reviews, 2019: Lab tests of today's top tools

•

What is Magecart? How this hacker group steals payment card data

•

9 policies and procedures you need to know about if you’re starting a new security program

•

12 tips for effectively presenting cybersecurity to the board

•

Why security-IT alignment still fails

•

11 top cloud security threats

Miscellaneous: R Systems & AWS

Cloud Roadmap Assessment for AWS

R Systems, an Advanced-tier AWS Partner, and a global leader in AI/Analytics services, is uniquely qualified to not only help you fully leverage the AWS platform to build a cloud roadmap, but also to fuel your digital transformation by helping you adopt/embed cutting-edge technologies within your business wireframe like data & analytics, AI/ML, cognitive automation, etc. to help you achieve your business goals! Read more ▶

Image: Security software reviews, 2019: Lab tests of today's top tools

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: What is Magecart? How this hacker group steals payment card data

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk. Read more ▶

 
 
Image: 9 policies and procedures you need to know about if you’re starting a new security program

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more ▶

Image: 11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Miscellaneous: Converge Technology Solutions, a Hewlett Packard Enterprise Platinum Solution Provider

End of Support for Windows Server 2008 Pushes for Upgrades

As the end of support for Windows Server 2008 nears, organizations are urged to upgrade to the latest versions, available on HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com