CSO

CSO Daily

April 14, 2020

Image: 5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one. Read more ▶

Your Must-Read Stories

•

How CISOs can best assess geopolitical risk factors

•

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

•

What are vulnerability scanners and how do they work?

•

AI-powered deception technology speeds deployment, improves results

•

8 key security considerations for protecting remote workers

•

14 real-world phishing examples — and how to recognize them

White Paper: Intel

AI Building Blocks for a Self-Service Kiosk

Taking advantage of building blocks and streamlined models enables developers to build solutions in less time. Read more ▶

Image: How CISOs can best assess geopolitical risk factors

How CISOs can best assess geopolitical risk factors

A recent report on Russian-affiliated advanced persistent threats provides a template to help CISOs evaluate risk from nation-state actors. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification explained: What defense contractors need to know

The Cybersecurity Maturity Model Certification (CMMC) is a unified standard for implementing cybersecurity across the defense industrial base, which includes over 300,000 companies in the supply chain. Read more ▶

 
 
Image: What are vulnerability scanners and how do they work?

What are vulnerability scanners and how do they work?

Vulnerability scanners are automated tools that allow organizations to check if their networks, systems and applications have security weaknesses that could expose them to attacks. Read more ▶

Image: AI-powered deception technology speeds deployment, improves results

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis. Read more ▶

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Image: 14 real-world phishing examples — and how to recognize them

14 real-world phishing examples — and how to recognize them

How well do you know these crafty cons? Read more ▶

White Paper: Intel

Health Tech Takes Flight with VR

Just as pilots use VR-guided simulators to rehearse their flights, the same technology can reconstruct a patient’s 2D medical imaging into a 3-dimensional, 360-degree model. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com