CSO

CSO Daily

May 24, 2019

Image: Scam alert! 14 red flags to look out for

Scam alert! 14 red flags to look out for

Does your security awareness training program help your employees learn when someone is trying to scam them? Read more ▶

Your Must-Read Stories

•

How 6 cutting-edge security tools tackle today's threats

•

Can the re-use of identity data be a silver bullet for industry?

•

How to implement and use the MITRE ATT&CK framework

•

Does it matter who the CISO reports to?

•

The dirty dozen: 12 top cloud security threats for 2018

•

The new CISO's playbook: 5 rules to follow

White Paper: Alfresco Software

Alfresco – A Next- Generation Platform for Customer Communication Archiving and e-Presentment

Customer communications are fundamental to organizations of all sizes. They provide a critical means of communicating money owed, account history, case updates, policy details, and many other kinds of marketing and transactional detail to consumers. Read more ▶

Image: How 6 cutting-edge security tools tackle today's threats

How 6 cutting-edge security tools tackle today's threats

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Can the re-use of identity data be a silver bullet for industry?

Can the re-use of identity data be a silver bullet for industry?

The ability to re-use identity data for individuals across different systems would greatly simplify authentication. Here's what it would take to make it happen. Read more ▶

 
 
Image: How to implement and use the MITRE ATT&CK framework

How to implement and use the MITRE ATT&CK framework

The MITRE ATT&CK framework is a popular template for building detection and response programs. Here's what you'll find in its knowledgebase and how you can apply it to your environment. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: The dirty dozen: 12 top cloud security threats for 2018

The dirty dozen: 12 top cloud security threats for 2018

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

White Paper: SelectHub

Embedded Analytics Unboxed: Features, Requirements & Top Vendors

Are you looking to integrate analytics capabilities into your non-BI applications? We evaluate some of the top “out-of the-box” solutions to help you in your decision. Learn about key features like “embeddability” and use our handy checklist to find out how well the top products meet your requirements. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.