CSO

CSO Daily

December 28, 2018

Image: How to ace the CISO interview – be ready for the tough questions

How to ace the CISO interview – be ready for the tough questions

The final hurdle to top information security jobs is the interview, or as one executive put it, “interviews” – as many as a dozen. So successful candidates have to be prepared for the questions that are designed to see if they can be a business leader as well as a “guardian of the data.” Read more ▶

Your Must Read Stories

•

How to ace the CISO interview – be ready for the tough questions

•

17 penetration testing tools the pros use

•

Malware detection in 9 easy steps

•

How to write an information security policy

•

History lessons: What is Stuxnet, who created it and how does it work?

•

How to set up a successful digital forensics program

•

What is a keylogger? How attackers can monitor everything you type

eBook: Citrix Systems Inc

Delivering highly available networks for the distributed enterprise - Citrix SD-WAN on AWS

Cloud technology has revolutionized the way global businesses operate. The ability to provision and de-provision IT resources on-demand and at a global scale gives them the agility to better support distributed workforces. Cloud providers also provide native access to innovative and emerging technologies, giving businesses of all sizes a path to retire inefficient processes and systems and drive new value from their critical applications. Read more ▶

Image: 17 penetration testing tools the pros use

17 penetration testing tools the pros use

We asked a few professional hackers for their thoughts on the best pen testing tools. Here's what they said. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: Malware detection in 9 easy steps

Malware detection in 9 easy steps

Hey Windows users: Here's how to get the incredible power of 67 antivirus engines with no performance impact on your computer Read more ▶

 
 
Image: How to write an information security policy

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective Read more ▶

Image: History lessons: What is Stuxnet, who created it and how does it work?

History lessons: What is Stuxnet, who created it and how does it work?

Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose was not just to infect PCs but to cause real-world physical effects. Specifically, it targets centrifuges used to produce the enriched uranium that powers nuclear weapons and reactors. Read more ▶

Image: How to set up a successful digital forensics program

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. Read more ▶

Image: What is a keylogger? How attackers can monitor everything you type

What is a keylogger? How attackers can monitor everything you type

Keystroke logging software is one of the oldest forms of malware, dating back to typewriters. It's still popular and often used as part of larger cyber attacks. Read more ▶

White Paper: Zscaler

The Survivor’s Guide to building an Office 365 network

From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.