CSO

CSO Daily

October 22, 2019

Image: Top cloud security controls you should be using

Top cloud security controls you should be using

Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind to secure your cloud workloads. Read more ▶

Your Must-Read Stories

•

4 blockchain security lessons from Euroclear's CISO

•

Third party risk management: A getting started guide

•

6 top OSINT tools: Find sensitive public info before hackers do

•

The CISO’s newest responsibility: Building trust

•

10 risk factors no one talks about

•

When and how to write a GDPR DPIA

White Paper: Stratix Corp

Ahead of the Curve: How Mobile Tech Adoption Maturity is Reshaping Enterprise Growth

Success in the current fast-moving digital landscape often hinges upon how effective enterprises can manage their workforces transitioning from laptop and PC-dominance to mobile device-centric environments. IT leaders and decision makers navigating these challenges must settle upon a coherent strategy and cadence for mobile tech adoption relative to their competitors. Read more ▶

Image: 4 blockchain security lessons from Euroclear's CISO

4 blockchain security lessons from Euroclear's CISO

Euroclear is taking a security in-depth approach with its blockchain project. CISO Vincent Laurens shares his experience and offers advice for others looking to get started with blockchain. Read more ▶

Image: Train to be a certified cyber security professional for just $39

DEALPOST

Train to be a certified cyber security professional for just $39

This twelve-course bundle will show you ethical hacking and pen-testing techniques Read more ▶

Image: Third party risk management: A getting started guide

Third party risk management: A getting started guide

Your vendor partners may be your organization's weakest link. Without a strong third party risk management program in place, how would you know? Read more ▶

 
 
Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: The CISO’s newest responsibility: Building trust

The CISO’s newest responsibility: Building trust

Trust is becoming a differentiator in the marketplace, and CISOs who seek a more strategic role in their must engage the full range of stakeholders to build confidence that the organization has their best interests in mind. Read more ▶

Image: 10 risk factors no one talks about

10 risk factors no one talks about

These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them. Read more ▶

Image: When and how to write a GDPR DPIA

When and how to write a GDPR DPIA

Data Protection Impact Assessments are a way for companies to minimize risk around new processes and keep a record demonstrating their efforts to comply with the GDPR. Read more ▶

Miscellaneous: THE CHANNEL COMPANY

Drive Digital Transformation With Composable Infrastructure

Read our White Paper to learn how the composable infrastructure platform HPE Synergy, powered by Intel® Xeon® Scalable processors, empowers businesses to get the most value out of their digital transformation initiatives. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.