CSO

CSO Daily

January 13, 2020

Image: What is security's role in digital transformation?

What is security's role in digital transformation?

With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organization and working to transform the IT culture. Read more ▶

Your Must-Read Stories

•

Winning the war for cybersecurity talent

•

Moving security operations to the cloud

•

5 ways to improve your security posture in 2020

•

Protocol analyzers: Who needs them, and how to choose one

•

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

•

What is a false flag? How state-based hackers cover their tracks

Video/Webcast: OpenText

Customer Communications: Building a Successful Omnichannel Solution

In the digital era, customer communications are changing from print communications to electronic. A new IDG MarketPulse survey tracks how organizations are grappling with that transition and points the way to a winning omnichannel strategy. Read more ▶

Image: Winning the war for cybersecurity talent

Winning the war for cybersecurity talent

Security leaders say they expect demand for talent to outstrip supply for at least the next several years. Your task: develop staffing plans that recognize that reality. Read more ▶

Image: This $387 Azure certification prep bundle is currently on sale for $29

DEALPOST

This $387 Azure certification prep bundle is currently on sale for $29

Set yourself up to pass Azure certification exams with these 4 courses. Read more ▶

Image: Moving security operations to the cloud

Moving security operations to the cloud

New ESG research finds organizations are aggressively replacing on-premises security analytics and operations technologies with cloud-based alternatives. The shift comes with both short-term wins and strategic benefits. Read more ▶

 
 
Image: 5 ways to improve your security posture in 2020

5 ways to improve your security posture in 2020

What will shape the cybersecurity conversation in 2020? Only time will tell, but following these five trends will help you rise to new challenges. Read more ▶

Image: Protocol analyzers: Who needs them, and how to choose one

Protocol analyzers: Who needs them, and how to choose one

Whether for an ad-hoc analysis of a problem or ongoing monitoring, a protocol analyzer can be a valuable tool for the security pro. Read more ▶

Image: How to fix insecure LDAP binds to prevent exposed Windows admin credentials

How to fix insecure LDAP binds to prevent exposed Windows admin credentials

Although Microsoft has a permanent fix on the way, it's possible that you're exposing domain admin account credentials in cleartext. Here's how to check for and solve that problem. Read more ▶

Image: What is a false flag? How state-based hackers cover their tracks

What is a false flag? How state-based hackers cover their tracks

False flags are a favorite technique of cyber attackers connected to Russian intelligence, but they don't have a monopoly on the practice. Read more ▶

White Paper: Imply

Introducing Apache Druid

This whitepaper provides an introduction to Apache Druid, including its evolution, core architecture and features, and common use cases. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com