CSO

CSO Daily

February 04, 2019

Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today’s privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Your Must-Read Stories

•

10 essential enterprise security tools (and 11 nice-to-haves)

•

How to ace the CISO interview – be ready for the tough questions

•

Best resources for setting up Microsoft Office 365 security

•

Understanding application security: A process and tools for securing software

•

How to protect backups from ransomware

•

What it takes to build a zero trust network

White Paper: Progress KendoReact

Whitepaper: Learn How to Plan a React Application

Learn strategies for tooling, frontend and UX, testing and performance to boost your (and your team’s) productivity. Read more ▶

Image: 10 essential enterprise security tools (and 11 nice-to-haves)

10 essential enterprise security tools (and 11 nice-to-haves)

Do you have the right tools to handle a changing threat landscape, tougher regulatory climate, and increasing IT infrastructure complexity? Here are the must-have security tools for meeting today's challenges. Read more ▶

Image: You can sign up for this team collaboration app for free today

FROM OUR BUSINESS PARTNERS

You can sign up for this team collaboration app for free today

Unlock your team’s full potential with free chat, file sharing, and task management. Read more ▶

Image: How to ace the CISO interview – be ready for the tough questions

How to ace the CISO interview – be ready for the tough questions

The final hurdle to top information security jobs is the interview, or as one executive put it, “interviews” – as many as a dozen. So successful candidates have to be prepared for the questions that are designed to see if they can be a business leader as well as a “guardian of the data.” Read more ▶

 
 
Image: Best resources for setting up Microsoft Office 365 security

Best resources for setting up Microsoft Office 365 security

Office 365 presents admins with many choices and options. These information sources, online forums and script repositories can help you make the right decisions. Read more ▶

Image: Understanding application security: A process and tools for securing software

Understanding application security: A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become more potent and prevalent. Read more ▶

Image: How to protect backups from ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps. Read more ▶

Image: What it takes to build a zero trust network

What it takes to build a zero trust network

Zero trust networks offer better protection against data breaches, but the road to them can be arduous. Read more ▶

Video/Webcast: Dell EMC and Intel®

Advances in Data Protection for a Digital World

To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. In fact, respondents to ESG’s ongoing research consistently cite cost reduction as one of the top business drivers affecting their IT spending. Download this webcast from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.