CSO

CSO Daily

February 06, 2020

Image: 6 tips for building your cybersecurity bench

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive. Read more ▶

Your Must-Read Stories

•

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

•

Risk profiling gives PPD real-time view of vulnerabilities

•

10 tough security interview questions, and how to answer them

•

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

•

5 steps to avoid credential dumping attacks

•

How one law firm made security a business development opportunity

White Paper: Flexera Software

Six Must-Do Steps to Modernize Your SAM

In this white paper you will discover the six critical shifts that ITAM and SAM teams must make to modernize and remain relevant in this new technology landscape. Read more ▶

Image: Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack. Read more ▶

Image: Arcadia makes supporting clean energy easier

DEALPOST

Arcadia makes supporting clean energy easier

Get a $20 Amazon gift card or 4 standard LED bulbs just by signing up. Read more ▶

Image: Risk profiling gives PPD real-time view of vulnerabilities

Risk profiling gives PPD real-time view of vulnerabilities

How drug development company PPD built its own risk profiling tool to give all stakeholders a simpler, clear view of risk associated with every IT asset. Read more ▶

 
 
Image: 10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews. Read more ▶

Image: Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Recent False Claims Act cases a caution to gov’t contractors that skimp on security

Two FCA cases unsealed in 2019 show that contractors can face multi-million-dollar penalties if they don't comply with federal government cybersecurity requirements. Read more ▶

Image: 5 steps to avoid credential dumping attacks

5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks. Read more ▶

Image: How one law firm made security a business development opportunity

How one law firm made security a business development opportunity

Mark Walmsley, CISO at international law firm Freshfields, says a proactive approach to security helps the business win clients and gets its lawyers to embrace security. Read more ▶

White Paper: Flexera Software

5 Ways to Integrate SaaS Into Your SAM Strategy

In this white paper: 5 Ways to Integrate SaaS Into Your SAM Strategy, you will learn about the “must-do’s” that should be part of your Software Asset Management practice when implementing your SaaS plan. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com