CSO

CSO Daily

February 07, 2020

Image: 8 top OSINT tools: Find sensitive public info before hackers do

8 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Your Must-Read Stories

•

Why hacking must be addressed in digital privacy policymaking

•

6 tips for building your cybersecurity bench

•

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

•

How to check your vulnerability to credential dumping

•

10 tough security interview questions, and how to answer them

•

Best antivirus software: 12 top tools

Video/Webcast: Druva

Are you all in with cloud data protection?

Cloud is now a significant part of the enterprise data protection strategy. Read more ▶

Image: Why hacking must be addressed in digital privacy policymaking

Why hacking must be addressed in digital privacy policymaking

Virtually all attention to date has been focused on developing legal and regulatory remedies to address digital privacy. But little attention has been paid to the flip side of this two-sided coin—namely, digital hacking. Read more ▶

Image: Arcadia makes supporting clean energy easier

DEALPOST

Arcadia makes supporting clean energy easier

Get a $20 Amazon gift card or 4 standard LED bulbs just by signing up. Read more ▶

Image: 6 tips for building your cybersecurity bench

6 tips for building your cybersecurity bench

You can only control a limited number of the variables that lead people to leave a job. Here are some suggestions for keeping your talent and helping them thrive. Read more ▶

 
 
Image: Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

Infrastructure-as-code templates are the source of many cloud infrastructure weaknesses

A new report shows a high percentage of IaC template misconfigurations in cloud deployments that leave them vulnerable to attack. Read more ▶

Image: How to check your vulnerability to credential dumping

How to check your vulnerability to credential dumping

Use these techniques to see if attackers have harvested authentication credentials from your Windows network. Read more ▶

Image: 10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews. Read more ▶

Image: Best antivirus software: 12 top tools

Best antivirus software: 12 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability. Read more ▶

Miscellaneous: Quest Software

Database Professionals Look To The Future: 2020 Trends in Database Administration

These are some of the findings from a new survey taken by 312 database managers, all members of PASS, the world’s largest community of data professionals leveraging the Microsoft data plaform. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com