CSO

CSO Daily

January 14, 2020

Image: Hiring scarce security talent: 8 secrets to working with recruiters

Hiring scarce security talent: 8 secrets to working with recruiters

Recruiters can be a valuable resource, especially when you're looking to hire for specialized and in-demand skills. Here's how to make the most of the relationship. Read more ▶

Your Must-Read Stories

•

Inspecting TLS-encrypted traffic with mitmproxy

•

Moving security operations to the cloud

•

2020 outlook for cybersecurity legislation

•

Review: How Fugue protects cloud assets

•

How to stop email spoofing of parked domains

•

Protocol analyzers: Who needs them, and how to choose one

Miscellaneous: Druva

Osterman Research: Why you need third party backup for Office 365

Microsoft Office 365 is the top productivity tool for today’s modern workforce. But did you know that Office 365 native capabilities may not be enough to protect your organization from accidental and malicious data loss -- as well as meet strict data compliance and regulatory requirements? Read more ▶

Image: Inspecting TLS-encrypted traffic with mitmproxy

Inspecting TLS-encrypted traffic with mitmproxy

The free, open-source mitmproxy tool makes it easy to inspect TLS-encrypted app and web traffic to see exactly who your phone is talking to. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: Moving security operations to the cloud

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits. Read more ▶

 
 
Image: 2020 outlook for cybersecurity legislation

2020 outlook for cybersecurity legislation

Here's a rundown of all the security-related bills working their way through this year's U.S. Congress, plus some hot security topics likely to be debated. Read more ▶

Image: Review: How Fugue protects cloud assets

Review: How Fugue protects cloud assets

The Fugue platform fills a critical need, bringing infrastructure and security compliance protection to the cloud. Read more ▶

Image: How to stop email spoofing of parked domains

How to stop email spoofing of parked domains

Publishing a DMARC record for unused domains is a good idea. Here's how. Read more ▶

Image: Protocol analyzers: Who needs them, and how to choose one

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro. Read more ▶

Miscellaneous: Druva

Protect your workforce productivity: What's your Office 365 backup strategy?

As users of Office 365, your organization has a Shared Responsibility Model with Microsoft. Microsoft ensures that the SaaS infrastructure is up-and-running while your organization is responsible for Office 365 data backup, retention, security and governance. Therefore your organization is responsible for protecting user data from insider threats, outside attacks, and data compliance - such as GDPR, CCPA, and legal holds. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com