CSO

CSO Daily

December 19, 2019

Image: 5 security operations and analytics trends to watch in 2020

5 security operations and analytics trends to watch in 2020

Look for more integration, an increasing focus on risk management, and greater use of the public cloud. Read more ▶

Your Must-Read Stories

•

NHTSA odometer disclosure rule might pave way for e-signature authentication

•

How to protect your business from holiday attacks

•

Hackers use free tools in new APT campaign against industrial sector firms

•

"Penn Test" challenge helps infosec team think like attackers

•

Common security buying mistakes SMBs make — and how to avoid them

•

5 tips for structuring your security organization for growth

White Paper: Adobe Systems Inc.

Adobe Sign Technical Overview

This paper provides a high-level overview of Adobe Sign architecture, security, compliance, identity management, document handling, network protection, performance monitoring, service management, governance and other key technical topics. Read more ▶

Image: NHTSA odometer disclosure rule might pave way for e-signature authentication

NHTSA odometer disclosure rule might pave way for e-signature authentication

The Final Rule allows flexibility in the technology they use to digitally verify identity through electronic signatures, including a pen pad or biometrics. Read more ▶

Image: Learn how to be an ethical hacker with this $39 in-depth training bundle

DEALPOST

Learn how to be an ethical hacker with this $39 in-depth training bundle

The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve. Read more ▶

Image: How to protect your business from holiday attacks

How to protect your business from holiday attacks

Attackers see opportunity in the holidays, but these simple steps and considerations can help block their efforts. Read more ▶

 
 
Image: Hackers use free tools in new APT campaign against industrial sector firms

Hackers use free tools in new APT campaign against industrial sector firms

Attackers seek to make attribution harder and use sophisticated, realistic spear-phishing emails. Read more ▶

Image:

"Penn Test" challenge helps infosec team think like attackers

At Penn Medicine, gamifying security training builds skills, drives employee retention. Read more ▶

Image: Common security buying mistakes SMBs make — and how to avoid them

Common security buying mistakes SMBs make — and how to avoid them

Small- to medium-sized businesses (SMBs) often lack the resources and knowledge to properly vet cybersecurity solutions. Avoid poor decisions with these best practices. Read more ▶

Image: 5 tips for structuring your security organization for growth

5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

White Paper: Akamai Technologies Inc

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com