CSO

CSO Daily

April 01, 2019

Image: 11 questions to ask before buying AI-enabled security software

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more ▶

Your Must-Read Stories

•

Critical Magento SQL injection flaw could be targeted by hackers soon

•

6 secrets to CISO job longevity

•

How to master email security with DMARC, SPF and DKIM

•

12 tips for effectively presenting cybersecurity to the board

•

7 keys to a successful IT security career

•

How honeypots catch hackers in the act

White Paper: CDW Corporation

Changing the Way Users Work

The Modern Workforce Insight Report explores how the workforce is evolving. How it’s being shaped by both technology and culture, how companies are adapting and some of the challenges — and opportunities — that it presents. Read more ▶

Image: Critical Magento SQL injection flaw could be targeted by hackers soon

Critical Magento SQL injection flaw could be targeted by hackers soon

Popular e-commerce platform Magento has released security patches to fix the flaw. Researchers say update now. Read more ▶

Image: Get a two-year subscription to Ivacy VPN for only $2.03/mo

FROM OUR BUSINESS PARTNERS

Get a two-year subscription to Ivacy VPN for only $2.03/mo

Ivacy VPN ensures that all your downloads and devices stay totally secure, so you can stay safe online without being inconvenienced. Read more ▶

Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

 
 
Image: How to master email security with DMARC, SPF and DKIM

How to master email security with DMARC, SPF and DKIM

The three main email security protocols complement one another, so implementing them all provides the best protection. That’s easier said than done, but these tips can help. Read more ▶

Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Image: How honeypots catch hackers in the act

How honeypots catch hackers in the act

A honeypot is a system designed to lure hackers into revealing their origins and techniques, and they're used by security researchers and corporate IT alike. Read more ▶

White Paper: CDW & Cisco Systems

Changing the Way Users Work

The Modern Workforce Insight Report explores how the workforce is evolving. How it’s being shaped by both technology and culture, how companies are adapting and some of the challenges — and opportunities — that it presents. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.