CSO

CSO Daily

February 17, 2020

Image: 5 things you should know about cybersecurity insurance

5 things you should know about cybersecurity insurance

Understanding what it can and can't do for your business is critical to getting the most out of a cyber insurance policy. Read more ▶

Your Must-Read Stories

•

The CSO's playbook for forging board relationships

•

How cyber attackers hide malware on your network

•

Cybersecurity spending trends, 2020

•

8 steps to being (almost) completely anonymous online

•

How to use Metasploit, the popular hacking tool

•

The 25 worst passwords of 2019, and 8 tips for improving password security

White Paper: VMware

Forrester: Total economic impact of VMware EUC

VMware commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Horizon, an end user computing solution that provides users access to all their virtual desktops and applications through a single digital workspace. Read more ▶

Image: The CSO's playbook for forging board relationships

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor. Read more ▶

Image: Train to become a skilled AWS expert for less than $50

DEALPOST

Train to become a skilled AWS expert for less than $50

This expert-led e-training package is ideal for anyone who wants to expand their skill set Read more ▶

Image: How cyber attackers hide malware on your network

How cyber attackers hide malware on your network

Knowing where to look for malware lurking on your network gives you a better chance to prevent damage from it. Read more ▶

 
 
Image: Cybersecurity spending trends, 2020

Cybersecurity spending trends, 2020

Spending is up, but perhaps not in the most needed areas, increased business leader involvement brings new challenges, while vertical industries have different requirements and priorities. Read more ▶

Image: 8 steps to being (almost) completely anonymous online

8 steps to being (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

Image: How to use Metasploit, the popular hacking tool

How to use Metasploit, the popular hacking tool

Metasploit is a widely used penetration testing tool that makes hacking way easier than it used to be. It has become an indispensable tool for both red team and blue team. Read more ▶

Image: The 25 worst passwords of 2019, and 8 tips for improving password security

The 25 worst passwords of 2019, and 8 tips for improving password security

Blacklist these 25 passwords now and use these tips to improve enterprise password security. Read more ▶

White Paper: Qlik Technologies Inc

Eckerson Group Report: Deep Dive Data Warehouse Automation

Take a deep dive into data warehouse automation (DWA) to know its’ history, drivers and evolving capabilities. Learn how you can reduce the dependency on ETL scripting, advance your user experience, implementation, maintenance and updates of your data warehouse and data mart environments with Qlik Compose™. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com