CSO

CSO Daily

April 21, 2020

Image: Google enters zero-trust market with BeyondCorp Remote Access offering

Google enters zero-trust market with BeyondCorp Remote Access offering

Google makes its internal zero-trust access infrastructure available to anyone on a subscription basis as an alternative to VPNs. Read more ▶

Your Must-Read Stories

•

8 video chat apps compared: Which is best for security?

•

Mail-in ballots during COVID crisis necessary, but with risk says expert

•

10 markers of a great cybersecurity program

•

RubyGems typosquatting attack hits Ruby developers with trojanized packages

•

Work from home, phase 2: What comes next for security?

•

SOC analyst job description, salary, and certification

White Paper: Palo Alto Networks

Elements of Security Operations E-Book

Elements of Security Operations details the building blocks of simpler, more effective security operations, drawing from our experts’ real-world experiences to help you build capabilities that deserve your confidence. You’ll learn how you can simplify operations by integrating and consolidating tools and automate repetitive tasks to better use your analyst talent. Read more ▶

Image: 8 video chat apps compared: Which is best for security?

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs? Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Mail-in ballots during COVID crisis necessary, but with risk says expert

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed. Read more ▶

 
 
Image: 10 markers of a great cybersecurity program

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more ▶

Image: RubyGems typosquatting attack hits Ruby developers with trojanized packages

RubyGems typosquatting attack hits Ruby developers with trojanized packages

Attacker targeted Windows systems to hijack cryptocurrency transactions, and was able to evade anti-typosquatting measures. Read more ▶

Image: Work from home, phase 2: What comes next for security?

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation. Read more ▶

Image: SOC analyst job description, salary, and certification

SOC analyst job description, salary, and certification

A SOC analyst is a cybersecurity professional who works as part of a team to monitor and fight threats to an organization's IT infrastructure, and to assess security systems and measures for weaknesses and possible improvements. Read more ▶

White Paper: Palo Alto Networks

Gartner’s Top 9 Security Trends in 2020

The relentless pace of digital business and ongoing transition to cloud are challenging traditional security approaches. Acting on these developments, security and risk management leaders can improve resilience, better support business objectives and elevate their organizational standing. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com