CSO

CSO Daily

March 25, 2019

Image: 6 secrets to CISO job longevity

6 secrets to CISO job longevity

Business focus and communication are key, say long-serving chief security officers. Read more ▶

Your Must-Read Stories

•

7 keys to a successful IT security career

•

Monitoring encrypted network traffic for malicious activity

•

Effectively presenting cybersecurity to the board

•

Facebook stashing plain text passwords is a wake-up call to improve GRC

•

7 hot cybersecurity trends (and 4 going cold)

White Paper: Akamai Technologies Inc

5 Must-Ask DNS Questions

Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company. Read more ▶

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: Monitoring encrypted network traffic for malicious activity

Monitoring encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

 
 
Image: Effectively presenting cybersecurity to the board

Effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies. Read more ▶

Image: 7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶

White Paper: Akamai Technologies Inc

5 Reasons Enterprises Need a New Access Model

Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.