CSO

CSO Daily

December 06, 2019

Image: 8 common pen testing mistakes and how to avoid them

8 common pen testing mistakes and how to avoid them

Penetration testing is vital, but are you doing it right? Here are some common mistakes and advice on how to avoid them. Read more ▶

Your Must-Read Stories

•

4 authentication use cases: Which protocol to use?

•

How to manage Windows 10 1903 and 1909 security updates

•

Why BT's red team strikes for real

•

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

•

What is cybersecurity? Definition, frameworks, jobs, and salaries

•

Security Recruiter Directory

Video/Webcast: Illumio

Unlock Security from the Network: Segmentation Made Simple

This webinar teaches how decoupling security from the network can help improve security posture, increase network performance, and drive business results. Read more ▶

Image: 4 authentication use cases: Which protocol to use?

4 authentication use cases: Which protocol to use?

Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How to manage Windows 10 1903 and 1909 security updates

How to manage Windows 10 1903 and 1909 security updates

Your Windows update controls might be out of date if you haven't reviewed them since the 1803 update or earlier. Here are the new settings you need to know. Read more ▶

 
 
Image: Why BT's red team strikes for real

Why BT's red team strikes for real

UK-based BT's red team conducts attacks on live systems without informing the rest of the business or the blue team defending it. BT Group CSO Les Anderson says this is key to the company's proactive approach to security. Read more ▶

Image: CrowdStrike, Ukraine, and the DNC server: Timeline and facts

CrowdStrike, Ukraine, and the DNC server: Timeline and facts

Politicizing cybersecurity only serves to undermine trust in its practices and objectivity, experts fear. Read more ▶

Image: What is cybersecurity? Definition, frameworks, jobs, and salaries

What is cybersecurity? Definition, frameworks, jobs, and salaries

Cybersecurity is the practice of defending computers, networks, and data from malicious electronic attacks. Learn the skills, certifications and degrees you need to land a job in this challenging field. Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

White Paper: Illumio

Decoupling Security from the Network: The Evolution of Segmentation

Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2019 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com