CSO

CSO Daily

December 30, 2019

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Your Must-Read Stories

•

Best Android antivirus? The top 9 tools

•

6 steps for building a robust incident response plan

•

How to disable basic authentication in Microsoft Office 365

•

Does it matter who the CISO reports to?

•

6 top OSINT tools: Find sensitive public info before hackers do

•

Must-have features in a modern network security architecture

Miscellaneous: R Systems & AWS

Cloud Roadmap Assessment for AWS

R Systems, an Advanced-tier AWS Partner, and a global leader in AI/Analytics services, is uniquely qualified to not only help you fully leverage the AWS platform to build a cloud roadmap, but also to fuel your digital transformation by helping you adopt/embed cutting-edge technologies within your business wireframe like data & analytics, AI/ML, cognitive automation, etc. to help you achieve your business goals! Read more ▶

Image: Best Android antivirus? The top 9 tools

Best Android antivirus? The top 9 tools

There are plenty of antivirus tools for Android. Here's how the top nine measure up in protection, usability and features. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: 6 steps for building a robust incident response plan

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs. Read more ▶

 
 
Image: How to disable basic authentication in Microsoft Office 365

How to disable basic authentication in Microsoft Office 365

If you've implemented multi-factor authentication, you should disable the default basic authentication to make sure attackers can't exploit it. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: Must-have features in a modern network security architecture

Must-have features in a modern network security architecture

Form factors and use cases are changing, so network security must be more comprehensive, intelligent, and responsive than ever before. Read more ▶

Miscellaneous: Converge Technology Solutions, a Hewlett Packard Enterprise Platinum Solution Provider

End of Support for Windows Server 2008 Pushes for Upgrades

As the end of support for Windows Server 2008 nears, organizations are urged to upgrade to the latest versions, available on HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com