CSO

CSO Daily

September 02, 2019

Image: 5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization. Read more ▶

Your Must-Read Stories

•

How secure are your AI and machine learning projects?

•

Built to scale: 5 tips for structuring your security organization for growth

•

How to check Privileged Identity management settings for Office 365

•

Beware rogue email rules and forms

•

Capital One hack shows difficulty of defending against irrational cybercriminals

•

6 risk factors to know when hiring an MSSP

eBook: Riverbed Technology

Four Gaps Your APM Tool Can’t Cover (But Needs To)

IT operations teams have historically leveraged application performance monitoring (APM) tools to ensure the availability and performance of critical business apps. But the adoption of SaaS apps, cloud-native development strategies, and other technologies that fuel today’s digital transformation initiatives are straining traditional APM solutions, leaving noticeable gaps in IT’s monitoring strategies. Read more ▶

Image: How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

 
 
Image: How to check Privileged Identity management settings for Office 365

How to check Privileged Identity management settings for Office 365

Microsoft Azure Privileged Identity Management (PIM) allows you to set administrative rights for roles on an as-needed basis, reducing risk. Read more ▶

Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it. Read more ▶

Image: Capital One hack shows difficulty of defending against irrational cybercriminals

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns. Read more ▶

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

eBook: Riverbed Technology

Covering Your SaaS: How to manage the end-user experience of application environments you don’t fully control

How to take back control of SaaS apps and validate their impact on the business with end-user experience monitoring Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.