CSO

CSO Daily

March 19, 2020

Image: 6 ways attackers are exploiting the COVID-19 crisis

6 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck. Read more ▶

Your Must-Read Stories

•

Special report: Navigating the pandemic

•

4 key problems with digital identity and why we need a new approach

•

Free security resources for work-from-home employees during the COVID-19 crisis

•

Toward a common UI for security operations

•

Review: How ShiftLeft catches vulnerabilities during code development

•

The 10 most powerful cybersecurity companies

Miscellaneous: Optiv & Palo Alto Networks

Ensure the Security of Remote Workers

Does Your Security Program Secure Your Company and All Your Remote Workers? Read more ▶

Image: Special report: Navigating the pandemic

Special report: Navigating the pandemic

Nearly every technology company — and almost every business — is desperately determining how to use its arsenal of technology to combat the increasingly severe disruption caused by coronavirus. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: 4 key problems with digital identity and why we need a new approach

4 key problems with digital identity and why we need a new approach

To more accurately and more safely authenticate people online, digital identity needs to better cope with changes in people's lives. It's time to build identity technology for a digital life. Read more ▶

 
 
Image: Free security resources for work-from-home employees during the COVID-19 crisis

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home. Read more ▶

Image: Toward a common UI for security operations

Toward a common UI for security operations

New dashboards and visualization tools could improve personnel training, and SOC productivity while streamlining security operations. Read more ▶

Image: Review: How ShiftLeft catches vulnerabilities during code development

Review: How ShiftLeft catches vulnerabilities during code development

This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process. Read more ▶

Image: The 10 most powerful cybersecurity companies

The 10 most powerful cybersecurity companies

What makes these 10 security vendors the biggest power players? We break it down. Read more ▶

Data Sheet: Optiv & Palo Alto Networks

Set Up Your Secure Access Service Edge (SASE)

To stop cyberattacks, it’s necessary to inspect all traffic. Anything short of full inspection of all traffic introduces a significant gap in security. Prisma Access consistently protects all traffic, on all ports and from all applications. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com