CSO

CSO Daily

November 12, 2019

Image: How to lock down enterprise web browsers

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately. Read more ▶

Your Must-Read Stories

•

5 steps to a successful red team engagement

•

9 top SAST and DAST tools

•

Boeing's poor information security posture threatens passenger safety, national security, researcher says

•

Credential stuffing explained: How to prevent, detect and defend against it

•

5 cloud security basics and best practices

•

Stop ignoring printer security: It's time for CSOs to take control

eBook: ITsavvy, a Hewlett Packard Enterprise Gold Partner

A New Compute Experience for Hybrid IT

Read the eBook to learn more about the benefits of hybrid IT on Gen10 Servers. Read more ▶

Image: 5 steps to a successful red team engagement

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more ▶

Image: This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

DEALPOST

This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

The Complete Microsoft & Oracle SQL Certification Bundle features 11 courses on how to become a skilled database Read more ▶

Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

 
 
Image: Boeing's poor information security posture threatens passenger safety, national security, researcher says

Boeing's poor information security posture threatens passenger safety, national security, researcher says

The aircraft maker failed to perform minimum due diligence in securing its networks, then tried to cover it up, security researcher Chris Kubecka tells Aviation Cyber Security conference attendees. Read more ▶

Image: Credential stuffing explained: How to prevent, detect and defend against it

Credential stuffing explained: How to prevent, detect and defend against it

The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder for them to use credential stuffing. Read more ▶

Image: 5 cloud security basics and best practices

5 cloud security basics and best practices

Companies that move to the cloud have to assume new responsibilities, develop new skill sets and implement new processes. The first step to better cloud security is to assume you have no security. Read more ▶

Image: Stop ignoring printer security: It's time for CSOs to take control

Stop ignoring printer security: It's time for CSOs to take control

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Miscellaneous: ServiceNow Inc

Respond to business risks in real-time with integrated risk management

The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.