CSO

CSO Daily

April 22, 2020

Image: How to check your Windows network for vulnerabilities

How to check your Windows network for vulnerabilities

If you've made significant changes to your network to support remote workers, it's time to review what you've done to make sure everything is locked down. Read more ▶

Your Must-Read Stories

•

Cybersecurity apprenticeships help UK companies fill the skills gap

•

8 video chat apps compared: Which is best for security?

•

Google enters zero-trust market with BeyondCorp Remote Access offering

•

5 steps to create a security incident response plan

•

Mail-in ballots during COVID crisis necessary, but with risk says expert

•

10 markers of a great cybersecurity program

eBook: OReilly Media

Next Architecture

In this ebook, O’Reilly offers a collection of stand-alone chapters from several of its published and forthcoming books. You’ll get valuable information on innovative tools and processes to help you face disruption, deal with increasing complexity, and build new technical capabilities. Read more ▶

Image: Cybersecurity apprenticeships help UK companies fill the skills gap

Cybersecurity apprenticeships help UK companies fill the skills gap

Organisations large and small can find untapped, undeveloped cybersecurity talent through apprenticeship programs. Here's how some succeeded. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: 8 video chat apps compared: Which is best for security?

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs? Read more ▶

 
 
Image: Google enters zero-trust market with BeyondCorp Remote Access offering

Google enters zero-trust market with BeyondCorp Remote Access offering

Google makes its internal zero-trust access infrastructure available to anyone on a subscription basis as an alternative to VPNs. Read more ▶

Image: 5 steps to create a security incident response plan

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.) Read more ▶

Image: Mail-in ballots during COVID crisis necessary, but with risk says expert

Mail-in ballots during COVID crisis necessary, but with risk says expert

Noted election security researcher Harri Hursti says mail-in voting is likely the only option for a safe, secure US presidential election, but voter and election worker training needed. Read more ▶

Image: 10 markers of a great cybersecurity program

10 markers of a great cybersecurity program

How strong is your security program? These ten indicators will help you recognize greatness in your own organization and serve as a guide for what to look for in a partner. Read more ▶

White Paper: OReilly Media

5 Keys Areas for Tech Leaders to Watch in 2020

Read a thorough breakdown of it in this report, as experts Roger Magoulas and Steve Swoyer dive into the five essential areas you need to know if you’re in tech. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com