CSO

CSO Daily

July 04, 2019

Image: Top 10 global cybersecurity hubs for 2019

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders. Read more ▶

Your Must-Read Stories

•

12 tips for effectively presenting cybersecurity to the board

•

What is the dark web? How to access it and what you'll find

•

10 essential PowerShell security scripts for Windows administrators

•

What is Wireshark? And how to use this essential troubleshooting tool

•

9 policies and procedures you need to know about if you’re starting a new security program

•

6 ways malware can bypass endpoint protection

Miscellaneous: Flexera

Webinar: Managing change in Java SE. So where are we?

Managing Change in Java SE: So Where Are We? WBNR Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is the dark web? How to access it and what you'll find

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed. Read more ▶

 
 
Image: 10 essential PowerShell security scripts for Windows administrators

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read more ▶

Image: What is Wireshark? And how to use this essential troubleshooting tool

What is Wireshark? And how to use this essential troubleshooting tool

Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets. Read more ▶

Image: 9 policies and procedures you need to know about if you’re starting a new security program

9 policies and procedures you need to know about if you’re starting a new security program

Any mature security program requires each of these infosec policies, documents and procedures. Read more ▶

Image: 6 ways malware can bypass endpoint protection

6 ways malware can bypass endpoint protection

Breaches from attacks that defeat or run around endpoint protection measures are on the rise. Here's how attackers do it. Read more ▶

eBook: Flexera Software

New eBook: A Six-Step Framework for Your Multi-Cloud Strategy

6 Step Framework for Multi-Cloud Strategy Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].