CSO

CSO Daily

January 08, 2019

Image: Review: AttackIQ FireDrill watches the watchers

Review: AttackIQ FireDrill watches the watchers

This penetration testing tool is configured to operate from the inside, with the primary goal of identifying flaws, misconfigurations and outright shortcomings in all other cybersecurity defenses. Read more ▶

Your Must Read Stories

•

Review: AttackIQ FireDrill watches the watchers

•

Australian emergency warning system hacked, thousands receive alerts

•

8 phishing emails and why you’ll fall for them (or not)

•

Managing identity and access management in uncertain times

•

Harness the NIST CSF to boost your security and compliance

•

How security operations centers are adapting to the cloud era

•

The most interesting and important hacks of 2018

eBook: GitHub

Secure software development strategy essentials

In this guide, you'll learn how to secure your engineering team's processes and provide the flexibility they need to do their best work. We'll also address the unique regulatory and technical challenges that software companies face and how GitHub can help. Read more ▶

Image: Australian emergency warning system hacked, thousands receive alerts

Australian emergency warning system hacked, thousands receive alerts

A hacker took control of Australia’s Early Warning Network and sent an alert to thousands that said their personal data is not safe. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: 8 phishing emails and why you’ll fall for them (or not)

8 phishing emails and why you’ll fall for them (or not)

One CISO's collection of phishing emails provides insight into how the practice is evolving. That allows for better identification and prevention of phishing. Read more ▶

 
 
Image: Managing identity and access management in uncertain times

Managing identity and access management in uncertain times

Emerging standards and frameworks such as Gartner CARTA, Zero Trust, NIST SP 800 and IDSA provide guidelines, but how organizations manage identity and access management in 2019 is what matters most. Read more ▶

Image: Harness the NIST CSF to boost your security and compliance

Harness the NIST CSF to boost your security and compliance

The NIST Cybersecurity Framework (CSF) is a crowdsourced set of best practices to help you analyze your cyber risk posture and work towards improving it. Learn what it can do for your business, how to tailor and implement it, and how to manage it to work towards your desired security posture. Read more ▶

Image: How security operations centers are adapting to the cloud era

How security operations centers are adapting to the cloud era

Moving data and processes to the cloud presents challenges for enterprise SOCs. Here's how the industry and business are finding new ways to collect, monitor and analyze cloud-based security data. Read more ▶

Image: The most interesting and important hacks of 2018

The most interesting and important hacks of 2018

The hacks, exploits and data breaches security researcher need to most pay attention to are those that do something new or suddenly increase in volume. Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.