5 dev tools for better code security

Email not displaying correctly? View it in your browser.

CSO

CSO Risk Management

Apr 01, 2016
Featured Image

How to review and test backup procedures to ensure data restoration

If you want to test backup and restore procedures with your eyes wide open, consider these factors and tips. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

5 dev tools for better code security
Security Sessions: Tips for building a security team
Top 10 DBaaS security concerns
How long is a piece of string? The challenges and benefits of benchmarking security culture
9 tips to prevent you from falling for a tax scam
5 things you should know about two-factor authentication

White Paper: CommVault

5 Benefits of Disaster Recovery in the Cloud

This paper explores why the cloud is well suited for disaster recovery and what organizations need to consider to ensure that cloud DR is right for them. Read More

Thumbnail Image

5 dev tools for better code security

Static and dynamic analysis can catch vulnerabilities in the development process -- before the bad guys can even access your code Read More

Thumbnail Image
Video

Security Sessions: Tips for building a security team

You're asked to build (or rebuild) a security team at your organization. What are some first steps and tips to keep in mind to maximize talent and efficiency in your new department? Josh Feinblum, VP of Information Security at Rapid7 has some advice. Watch Now

Thumbnail Image

Top 10 DBaaS security concerns

Survey shows the worries users have of their databases in the cloud. Read More

Thumbnail Image

How long is a piece of string? The challenges and benefits of benchmarking security culture

Measuring security culture is challenging, but increasingly important to information security as we seek to maximize the value of people as well as technology to protect organizations. Asking how a security culture stacks up is like asking, "how long is a piece of string?" It depends on how you measure it, against itself or against an external baseline. The main point is to find cultural metrics that help you better understand and improve your enterprise security posture. Read More

Thumbnail Image

9 tips to prevent you from falling for a tax scam

Tyler Moffitt, senior threat research analyst at Webroot, provides tips for staying secure this tax season. Read More

Thumbnail Image

5 things you should know about two-factor authentication

One of the best pieces of security advice any computer expert can give you is to enable two-factor authentication for websites that support it. With password breaches so common nowadays, it could be the one thing that keeps hackers from stealing your identity online. Read More

White Paper: CommVault

5 Steps to Migrate Your Applications to the Cloud Stress Free

This paper examines five easy ways to overcome concerns about managing increased data flows, and moving operations to the cloud and offers solutions to each concern. Read More

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Risk Management as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.