CSO

CSO Daily

September 13, 2019

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Your Must-Read Stories

•

SOAPA vs. SOAR: How these security terms differ

•

6 biggest healthcare security threats for 2020

•

New NetCAT CPU side-channel vulnerability exploitable over the network

•

Implementing a successful cyber insurance program: Key steps and considerations

•

Security and compliance considerations for Microsoft Teams

•

8 hot IT security jobs and what they pay

Video/Webcast: HELPSYSTEMS

Balancing Security Priorities with User Efficiency

Organizations face a unique balancing act when it comes to user access. On the one side, they require access to organizational systems and data in order to successfully do their jobs. Read more ▶

Image: SOAPA vs. SOAR: How these security terms differ

SOAPA vs. SOAR: How these security terms differ

SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA). Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: 6 biggest healthcare security threats for 2020

6 biggest healthcare security threats for 2020

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read more ▶

 
 
Image: New NetCAT CPU side-channel vulnerability exploitable over the network

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks. Read more ▶

Image: Implementing a successful cyber insurance program: Key steps and considerations

Implementing a successful cyber insurance program: Key steps and considerations

In a first, a Black Hat micro summit explains how insurers assess risk to write cyber insurance policies as more organizations seek to indemnify themselves against potential breach losses. Read more ▶

Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

White Paper: Tencent Cloud LLC

Tencent Cloud: A Guide

Multinational corporations considering expansion into Chinese markets need a strong local cloud provider to guide them through the process. There are only a few native cloud providers in China that have the technical sophistication, sweeping infrastructure, advanced service offering and international expertise needed to help foreign enterprises navigate the complexities of the Chinese internet landscape. Tencent Cloud stands out as one of the foremost of these providers. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].