CSO

CSO Daily

September 18, 2019

Image: 6 questions candidates should ask at every security job interview

6 questions candidates should ask at every security job interview

The cybersecurity skills shortage means security pros can be picky about where they work. Here's how to suss out bad employers. Read more ▶

Your Must-Read Stories

•

How to detect and halt credential theft via Windows WDigest

•

The 5 CIS controls you should implement first

•

Implementing a successful cyber insurance program: Key steps and considerations

•

Three strategies to prove security's value

•

The top 5 email encryption tools: More capable, better integrated

•

Security and compliance considerations for Microsoft Teams

Video/Webcast: Workfront

How to Evolve the IT Function in 5 Simple Steps

The roles of today’s IT leaders are evolving as quickly as the technologies they provide. Read more ▶

Image: How to detect and halt credential theft via Windows WDigest

How to detect and halt credential theft via Windows WDigest

Attackers can steal user credentials by enabling credential caching in the Windows authentication protocol WDigest. Here's how to stop them. Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

 
 
Image: Implementing a successful cyber insurance program: Key steps and considerations

Implementing a successful cyber insurance program: Key steps and considerations

In a first, a Black Hat micro summit explains how insurers assess risk to write cyber insurance policies as more organizations seek to indemnify themselves against potential breach losses. Read more ▶

Image: Three strategies to prove security's value

Three strategies to prove security's value

How CISOs can identify and quantify security’s value in real dollars Read more ▶

Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

White Paper: Technology Integration Group (TIG), a Hewlett Packard Enterprise Platinum Partner

Confidence At The Core

Read our White Paper to discover why HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, are two generations ahead of the competition, offering protection of firmware and detection of tampering, as well as automated recovery features. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.