CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

August 25, 2020

Is now the time to deploy passwordless options?

Viable options are now available to supplement or eliminate (almost) the need for password authentication. Here are reasons why passwordless might work for you. Read more ▶

Image: Threat hunting explained: Taking an active approach to defense

Threat hunting explained: Taking an active approach to defense

Threat hunting is the practice of proactively searching for threats that are hiding in an organization's systems – before they attack.

Participate in IDG's 2020 Security Priorities Survey

73% of security executives believe that the impact of the pandemic will alter the way their business evaluates risk for at least the next five years. IDG is now conducting its annual Security Priorities survey and welcomes your participation.

The state of security hiring: Jobs, skills & salaries

Even in today's tough job market, demand for security pros remains high. We look at the hottest industries and markets for cyber security jobs — and what it will take to land a one of these top jobs.

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better aligned risk management.

Video/Webcast | Veeam Software Corporation & PureStorage

How to accelerate rapid data recovery

Maintaining a high level of resilience, increasing of backup performance, reduction of recovery time objectives (RTOs) and recovery point objectives (RPOs) — these are the main challenges that modern companies face to on their way to providing Availability and data protection.

4 best practices for managing and tracking SSL and TLS certificates

Do you know what SSL protocols you expose to your users? Are your settings optimized for security? Have you properly deprecated older TLS certs? Here's what you need to know.

A history of ransomware: The motives and methods behind these evolving attacks

Ransomware was a novelty until Bitcoin emerged. Today, ransomware is big business as gangs keep innovating.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701