CSO

CSO Daily

December 06, 2018

Image: Using a password manager: 7 pros and cons

Using a password manager: 7 pros and cons

This veteran security pro feels more secure now that he's using a password manager, but there are still risks. Read more ▶

Your Must Read Stories

•

Using a password manager: 7 pros and cons

•

Hackers get into National Republican Congressional Committee's email system

•

5 tips for getting started with DevSecOps

•

What is WebAuthN? Possibly the answer to all web authentication

•

How to perform a risk assessment: Rethinking the process

•

6 steps for building a robust incident response plan

•

What is digital trust? How CSOs can help drive business

Video/Webcast: Hyland Software

On-Demand Webinar: Digital Transformation, Your Content in Disguise

Learn why digital information does not equal digital transformation- and how you can drive the shift. Read more ▶

Image: Hackers get into National Republican Congressional Committee's email system

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: 5 tips for getting started with DevSecOps

5 tips for getting started with DevSecOps

Don't be fooled, integrating security into the DevOps process is a big project. But the payoff is worth the effort. Here's what you need to know to get started building DevSecOps from the ground up. Read more ▶

 
 
Image: What is WebAuthN? Possibly the answer to all web authentication

What is WebAuthN? Possibly the answer to all web authentication

With strong support from Google, Microsoft and other vendors, WebAuthN is poised to become a true standard for passwordless authentication over the web. Read more ▶

Image: How to perform a risk assessment: Rethinking the process

How to perform a risk assessment: Rethinking the process

New regulations and a changing threat landscape mean you need a different approach to your security risk assessment process. Read more ▶

Image: 6 steps for building a robust incident response plan

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs. Read more ▶

Image: What is digital trust? How CSOs can help drive business

What is digital trust? How CSOs can help drive business

Chief security officers should play a key role in building trust with customers, and that translates to better customer acquisition, greater customer loyalty, and more revenue. Read more ▶

eBook: Hyland Software

Digital Transformation: A Traveler's Guide for the Journey

Every organization has digital information and supporting systems, and often have for many years. However, many still struggle to transform their operations. It’s not just about making information available digitally; it’s about what organizations do with that information – making decisions, driving processes and serving customers. Read more ▶

You are currently subscribed to Editorial - CSO Daily as newsletter@newslettercollector.com.
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.