CSO

CSO Daily

March 17, 2020

Image: The 10 most powerful cybersecurity companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down. Read more ▶

Your Must-Read Stories

•

8 key security considerations for protecting remote workers

•

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

•

Review: How ShiftLeft catches vulnerabilities during code development

•

6 security metrics that matter – and 4 that don’t

•

How Visa built its own container security solution

•

British Red Cross takes a people-first approach to security

Video/Webcast: Optiv

PANW Access SASE Video

Eliminate The Drain On Your Corporate Headquarters Read more ▶

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy

The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats. Read more ▶

 
 
Image: Review: How ShiftLeft catches vulnerabilities during code development

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process. Read more ▶

Image: 6 security metrics that matter – and 4 that don’t

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more ▶

Image: How Visa built its own container security solution

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries. Read more ▶

Image: British Red Cross takes a people-first approach to security

British Red Cross takes a people-first approach to security

The British Red Cross sees cybersecurity as critical to protecting the people it serves. Here's how they help the entire organization understand that. Read more ▶

eBook: CyberArk Software Inc

5 Reasons to Prioritize Privileged Access Security

Establishing cyber security priorities can be difficult for security practitioners and there is confusion around what to do to get the most effective protection against cyber attacks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com