CSO

CSO Daily

December 05, 2019

Image: 4 authentication use cases: Which protocol to use?

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. Read more ▶

Your Must-Read Stories

•

Why BT's red team strikes for real

•

How to manage Windows 10 1903 and 1909 security updates

•

Flex streamlines app access for 20k suppliers with IAM overhaul

•

How to evaluate a CASB

•

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

•

Back to basics: Cybersecurity frameworks, jobs, and salaries

Video/Webcast: Iron Mountain

Balance Legacy Data of the Past with Cloud Initiatives of the Future

Join Iron Mountain and AWS for a live webcast to learn how to balance the needs of inactive legacy data and production cloud data to accelerate and simplify your migration to AWS. Read more ▶

Image: Why BT's red team strikes for real

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How to manage Windows 10 1903 and 1909 security updates

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know. Read more ▶

 
 
Image: Flex streamlines app access for 20k suppliers with IAM overhaul

Flex streamlines app access for 20k suppliers with IAM overhaul

Contract manufacturer Flex dumped its distributed identity and access management system for a more centralized, cloud-based option that better protects data and intellectual property. Read more ▶

Image: How to evaluate a CASB

How to evaluate a CASB

All cloud access security brokers share core functionality, but they deliver it differently and they all have unique feature sets. Here's what you need to know before buying one. Read more ▶

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

Image: Back to basics: Cybersecurity frameworks, jobs, and salaries

Back to basics: Cybersecurity frameworks, jobs, and salaries

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field. Read more ▶

White Paper: Workfront

Successful Digital Transformation Requires Rethinking Work Management: IT Can Lead the Way

In this whitepaper, the reader will learn more about what solution can address managing enterprise work and how IT can—and should—lead the change. Also, find out more on the essential attributes of a modern work management platform, and the future of metrics, Artificial Intelligence, and machine learning to help businesses adopt modern platforms. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com