CSO

CSO Daily

November 25, 2019

Image: Russia’s Sandworm hacking group a

Russia’s Sandworm hacking group a "test lab for cyberwar"

In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything from critical infrastructure to political campaigns in any part of the world. Read more ▶

Your Must-Read Stories

•

5 OT security takeaways CISOs need to communicate to stakeholders

•

The CISO’s newest responsibility: Building trust

•

9 top SAST and DAST tools

•

Third party risk management: A getting started guide

•

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

•

Credential stuffing explained: How to prevent, detect and defend against it

eBook: BlueAlly, a Hewlett Packard Enterprise Platinum Partner

A New Way Forward in Cloud Computing

Read the eBook to learn how servers such as the HPE ProLiant 380 Gen10 Server, powered by Intel® Xeon® Scalable processors, are helping to bring a superior compute experience to hybrid IT. Read more ▶

Image: 5 OT security takeaways CISOs need to communicate to stakeholders

5 OT security takeaways CISOs need to communicate to stakeholders

Operational technology security requires a different approach than IT security. Here are key takeaways CSOs need to communicate to other executives and boards of directors. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: The CISO’s newest responsibility: Building trust

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind. Read more ▶

 
 
Image: 9 top SAST and DAST tools

9 top SAST and DAST tools

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: Third party risk management: A getting started guide

Third party risk management: A getting started guide

Your vendor partners may be your organization's weakest link. Without a strong third party risk management program in place, how would you know? Read more ▶

Image: Compliance mandates, cybersecurity best practices dominate 2019 security priorities

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Read more ▶

Image: Credential stuffing explained: How to prevent, detect and defend against it

Credential stuffing explained: How to prevent, detect and defend against it

The automated use of breached usernames and passwords to access accounts is low risk, high reward for cybercriminals. Here's how to make it harder for them to use credential stuffing. Read more ▶

Miscellaneous: BlueAlly, a Hewlett Packard Enterprise Platinum Partner

Protect Your Data with Servers Based on Silicon Root of Trust

Read the fact sheet to explore the security foundation built into solutions such as the HPE ProLiant 380 Gen10 Server, powered by Intel® Xeon® Scalable processors, for safer computing against firmware attacks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.