CSO

CSO Daily

August 26, 2019

Image: 6 ways cybercriminals use commercial infrastructure

6 ways cybercriminals use commercial infrastructure

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities. Read more ▶

Your Must-Read Stories

•

4 takeaways from Black Hat 2019

•

Examining and addressing threat detection and response challenges

•

Built to scale: 5 tips for structuring your security organization for growth

•

12 things every computer security pro should know

•

Developing personal OPSEC plans: 10 tips for protecting high-value targets

•

6 risk factors to know when hiring an MSSP

White Paper: VMware

Cloud Migration Buyer's Guide

When undertaking a cloud migration initiative, your organization needs to keep key factors in mind in order to leverage existing on-premises investments and realize the agility, flexibility, and cost efficiencies moving to the cloud offers. This paper’s goal is to help you understand the key factors you need to consider while undertaking a cloud migration initiative−from building a business case upfront, to developing a migration plan and running the environment post-migration. Read more ▶

Image: 4 takeaways from Black Hat 2019

4 takeaways from Black Hat 2019

Experts identified new trends and warned of emerging or growing threats, including security's impact on software development and the growing threat social media poses. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Examining and addressing threat detection and response challenges

Examining and addressing threat detection and response challenges

Cybersecurity teams are fighting fires and still rely on manual processes. Meanwhile, the attack surface continues to grow. Process improvements are needed. Read more ▶

 
 
Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Solution Brief: VMware

Cloud Migrations with VMware Cloud™ on AWS Solution Brief

This solution brief talks about cloud migration challenges, how VMware Cloud on AWS resolves those challenges and key capabilities of VMware Cloud on AWS specific to the cloud migration use case. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.