CSO

CSO Daily

November 13, 2019

Image: Twitter spy scandal a wake-up call for companies to clean up their data access acts

Twitter spy scandal a wake-up call for companies to clean up their data access acts

Two Twitter employees accessed user data on behalf of the Saudi government. Neither should have had access, and this is a sign of a bigger problem at all companies. Read more ▶

Your Must-Read Stories

•

What is Security Onion? And is it better than a commercial IDS?

•

How much does it cost to launch a cyberattack?

•

Top SAST and DAST tools that can fix app security problems before deployment

•

The 5 CIS controls you should implement first

•

8 hot IT security jobs and what they pay

•

5 keys to protect your supply chain from cyberattacks

White Paper: Unitrends

Unitrends Backup and DRaaS IT Buyer’s Guide

With hundreds of vendors available, how do you pick the best Backup and Disaster Recovery solution for your organization? We examine the five best ways to beat data loss and downtime. Read more ▶

Image: What is Security Onion? And is it better than a commercial IDS?

What is Security Onion? And is it better than a commercial IDS?

Security Onion is a free intrusion detection system (IDS), security monitoring, and log management solution. Just one catch: You need skilled employees to manage it. Read more ▶

Image: This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

DEALPOST

This 11-course Microsoft & Oracle SQL certification prep bundle is only $39 today

The Complete Microsoft & Oracle SQL Certification Bundle features 11 courses on how to become a skilled database Read more ▶

Image: How much does it cost to launch a cyberattack?

How much does it cost to launch a cyberattack?

Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about. Unfortunately, a new report from Deloitte has found the cost of committing cyber crime is incredibly low. Read more ▶

 
 
Image: Top SAST and DAST tools that can fix app security problems before deployment

Top SAST and DAST tools that can fix app security problems before deployment

These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker. Read more ▶

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

Image: 5 keys to protect your supply chain from cyberattacks

5 keys to protect your supply chain from cyberattacks

The SANS Institute recently identified the key components to keep your supply chain secure. Here's why industry experts believe they are important. Read more ▶

White Paper: Matillion

Optimizing Business Analytics by Transforming Data in the Cloud

Companies understand the value of data. But before data can be analyzed, it must be collected and prepared for analytics engines, and this process can be inefficient and costly. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.