CSO

CSO Daily

April 20, 2020

Image: 10 markers of a great cybersecurity program

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more ▶

Your Must-Read Stories

•

Work from home, phase 2: What comes next for security?

•

RubyGems typosquatting attack hits Ruby developers with trojanized packages

•

SOC analyst job description, salary, and certification

•

Threat modeling explained: A process for anticipating cyber attacks

•

How to lock down Remote Desktop Protocol servers

•

The 15 biggest data breaches of the 21st century

White Paper: OReilly Media

5 Keys Areas for Tech Leaders to Watch in 2020

O’Reilly online learning contains information about the trends, topics, and issues tech leaders need to watch and explore. Read more ▶

Image: Work from home, phase 2: What comes next for security?

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: RubyGems typosquatting attack hits Ruby developers with trojanized packages

RubyGems typosquatting attack hits Ruby developers with trojanized packages

Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures. Read more ▶

 
 
Image: SOC analyst job description, salary, and certification

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. Read more ▶

Image: Threat modeling explained: A process for anticipating cyber attacks

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources. Read more ▶

Image: How to lock down Remote Desktop Protocol servers

How to lock down Remote Desktop Protocol servers

Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers. Read more ▶

Image: The 15 biggest data breaches of the 21st century

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory. Read more ▶

Miscellaneous: Salesforce.com

How to deliver digital learning for your employees

Skillup your Employees, Customers and Partners with myTrailhead Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com