CSO

CSO Daily

November 11, 2019

Image: 5 steps to a successful red team engagement

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more ▶

Your Must-Read Stories

•

9 top SAST and DAST tools

•

How EDR stops hackers in their tracks

•

Survey says! Help us set the CIO agenda for 2020

•

The CIS controls you should implement first

•

5 keys to protect your supply chain from cyberattacks

•

4 big changes coming to cybersecurity in 2020 and beyond

Research/Infographic: HID Global

Automation in Security: Addressing Today’s Threats

To become a strategic partner with the business, security teams must become proactive and data-driven. Check out this infographic from HID to see how real-time security analytics, machine learning, and artificial intelligence can help organizations activate their security data for better protection. Read more ▶

Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

DEALPOST

This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

The Complete Microsoft & Oracle SQL Certification Bundle features 11 courses on how to become a skilled database Read more ▶

Image: How EDR stops hackers in their tracks

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behavior, reacting automatically to block perceived threats and saving forensic data for further investigation Read more ▶

 
 
Image: Survey says! Help us set the CIO agenda for 2020

Survey says! Help us set the CIO agenda for 2020

This definitive benchmarking survey measures the role of the CIO in the organization, budgetary responsibilities, business and leadership challenges, and the key skills needed for the job today. We value your expertise in this area and invite you to participate in the survey. Go now! Read more ▶

Image: The CIS controls you should implement first

The CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: 5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important. Read more ▶

Image: 4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more ▶

White Paper: Flexera Software

Exclusive report: Flexera 2020 State of Tech Spend Survey

Our new, survey-based 2020 State of Tech Spend Report gives you fresh insight into spend optimization, and the relevance of data centers. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.