CSO

CSO Daily

March 12, 2020

Image: 6 security metrics that matter – and 4 that don’t

6 security metrics that matter – and 4 that don’t

The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more ▶

Your Must-Read Stories

•

Credit card skimmers explained: How they work and how to protect yourself

•

CSO Executive Sessions, Episode 5

•

How to prevent attackers from using Windows against you

•

Deloitte: 8 things municipal governments can do about ransomware

•

Open-source options offer increased SOC tool interoperability

•

Top cybersecurity facts, figures and statistics for 2020

eBook: AWS

Go long with machine learning

Discover how the NFL & AWS are using machine learning and artificial intelligence to transform how football is analyzed, played, coached, and experienced. NFL Next Gen Stats, powered by AWS, captures real-time location data, speed, and acceleration—for every player, on every play, and on every inch of the field. Read this eBook to see how the NFL uses machine learning to work smarter and create deeper, more engaging fan experiences. Read more ▶

Image: Credit card skimmers explained: How they work and how to protect yourself

Credit card skimmers explained: How they work and how to protect yourself

A card skimmer is a device designed to steal information stored on payment cards when consumers perform transactions at ATMs, gas pumps and other payment terminals. More recently, the use of the term has been extended to include malicious software or code that achieves the same goal on e-commerce websites. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: CSO Executive Sessions, Episode 5

CSO Executive Sessions, Episode 5

Chad Teat, Chief Information Security Officer at Floor & Decor joins host Bob Bragdon to discuss the art of balancing risk and business opportunity. Read more ▶

 
 
Image: How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute. Read more ▶

Image: Deloitte: 8 things municipal governments can do about ransomware

Deloitte: 8 things municipal governments can do about ransomware

Deloitte researchers explain why state and local governments are favored for ransomware attacks and how they can protect themselves with limited resources. Read more ▶

Image: Open-source options offer increased SOC tool interoperability

Open-source options offer increased SOC tool interoperability

Too many security tools in your SOC, and none of them talk to each other, but new vendor-supported open-source projects might lead to greater interoperability. Read more ▶

Image: Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry. Read more ▶

eBook: AWS

Automate Document Processing with AI

Download this eBook to learn how Amazon Textract "reads” documents as a person would, using artificial intelligence and extracts text, tables, forms, and other structured data. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com