CSO

CSO Daily

January 17, 2020

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Your Must-Read Stories

•

Information security basics: Definition, principles, and jobs

•

8 cheap or free cybersecurity training resources

•

What is security's role in digital transformation?

•

3 ways to make your Windows network harder to attack

•

What's ahead for digital identity in 2020?

•

7 security incidents that cost CISOs their jobs

Video/Webcast: Lastline Inc

A Better Approach to Reduce False Positives

Even after implementing SOAR, SIEM, IDPS and other technologies to improve security insights, companies still spend thousands of hours triaging alerts that are mostly false positives. Read more ▶

Image: Information security basics: Definition, principles, and jobs

Information security basics: Definition, principles, and jobs

Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data. Read more ▶

Image: Get this essential cloud security certification training bundle for only $49

DEALPOST

Get this essential cloud security certification training bundle for only $49

These web-based courses are perfect for anyone who doesn’t have the time to attend traditional classes Read more ▶

Image: 8 cheap or free cybersecurity training resources

8 cheap or free cybersecurity training resources

Use these free and cheap resources to train employees in entry-level cybersecurity skills, and to help job seekers "hack through the HR firewall." Read more ▶

 
 
Image: What is security's role in digital transformation?

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture. Read more ▶

Image: 3 ways to make your Windows network harder to attack

3 ways to make your Windows network harder to attack

Start the new year right by checking these three areas for potential vulnerabilities in your Windows network. Don't make it easy for attackers. Read more ▶

Image: What's ahead for digital identity in 2020?

What's ahead for digital identity in 2020?

Events of the past year have set up big changes for digital identity in 2020. Here's recap of what happened and what to expect this year. Read more ▶

Image: 7 security incidents that cost CISOs their jobs

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity. Read more ▶

Video/Webcast: Druva

Escape Your Legacy Backup Provider - Three Steps to a Better Backup Renewal

Cloud storage costs continue to decline and are now cheaper than data center storage. Couple this with the undeniable move to cloud as enterprises modernize and it’s clearly time to re-evaluate your backup infrastructure strategy. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com