CSO

CSO Update

April 16, 2020

Image: How Prudential measures its security culture to identify risk

How Prudential measures its security culture to identify risk

The financial services firm finds that employee confidence in how they would respond to a given security scenario is a better indicator of risk than their security knowledge. Read more ▶

Your Must-Read Stories

•

Work from home, phase 2: What comes next for security?

•

New platform AttackerKB gives defenders more context on vulnerabilities

•

Trump administration moves to revoke China Telecom's US licenses on security grounds

•

How to lock down Remote Desktop Protocol servers

•

Threat modeling explained: A process for anticipating cyber attacks

•

8 key security considerations for protecting remote workers

Miscellaneous: Citrix

2020 Strategic Road Map for Business Continuity Management

Security and risk management leaders targeting greater organizational resilience will need to ensure that their business continuity management programs are viewed as strategic imperatives by linking them to the development of corporate objectives and customer delivery commitments. Read more ▶

Image: Work from home, phase 2: What comes next for security?

Work from home, phase 2: What comes next for security?

Phase 1 was all about employee access, network communications confidentiality/integrity, and basic endpoint security. The next phases will move quickly from risk assessment to mitigation. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: New platform AttackerKB gives defenders more context on vulnerabilities

New platform AttackerKB gives defenders more context on vulnerabilities

Real-world input from pen testers and other members of the security community aims to help defenders make better assessments of vulnerability risks. Read more ▶

 
 
Image: Trump administration moves to revoke China Telecom's US licenses on security grounds

Trump administration moves to revoke China Telecom's US licenses on security grounds

A legal filing claims China Telecom is in violation of federal and state cybersecurity and privacy laws, but evidence is redacted. Read more ▶

Image: How to lock down Remote Desktop Protocol servers

How to lock down Remote Desktop Protocol servers

Make sure you've made all the proper settings to secure remote desktop protocol (RDP) to best protect your Windows network when supporting remote workers. Read more ▶

Image: Threat modeling explained: A process for anticipating cyber attacks

Threat modeling explained: A process for anticipating cyber attacks

Threat modeling is a structured process through which IT pros can identify potential security threats and vulnerabilities, quantify the seriousness of each, and prioritize techniques to mitigate attack and protect IT resources. Read more ▶

Image: 8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com