CSO

CSO Daily

March 04, 2020

Image: Do you trust your admins? 5 tips to manage administrator access

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that. Read more ▶

Your Must-Read Stories

•

How to write an effective information security policy

•

8 PCI DSS questions every CISO should be able to answer

•

How Target evolved its threat hunting program: 3 key steps

•

4 ways 5G will change your enterprise threat model

•

Secrets of industry-hopping CSOs

•

5 standout products from RSA 2020

White Paper: Splunk

Essential Guide to Container Monitoring

In this guide, we'll define the importance and benefits of software container monitoring in container vendors today. Read more ▶

Image: How to write an effective information security policy

How to write an effective information security policy

An information security policy is a high-level view of what should be done within a company in regard to information security. Here's how to create one that is an effective tool for improving your security posture. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: 8 PCI DSS questions every CISO should be able to answer

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either self-assessments or external audits. Here's what CISOs need to know. Read more ▶

 
 
Image: How Target evolved its threat hunting program: 3 key steps

How Target evolved its threat hunting program: 3 key steps

Target decided to re-evaluate its successful threat hunting program and found it could do better. This is what they did. Read more ▶

Image: 4 ways 5G will change your enterprise threat model

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now. Read more ▶

Image: Secrets of industry-hopping CSOs

Secrets of industry-hopping CSOs

Who says you can't change industries? Veteran security leaders Mark Weatherford and Cheri McGuire teach you how it’s done. Read more ▶

Image: 5 standout products from RSA 2020

5 standout products from RSA 2020

2020 will be remembered as the year the human element finally came to security. Read more ▶

White Paper: Cequence Security

Bulletproof Proxies: The Evolving Cybercriminal Infrastructure

Infrastructure is a necessary component of any cyberattack campaign, and as such many cybercriminal entrepreneurs are trending towards a new type of service for attackers, which we are calling “BulletProof Proxy”. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com