CSO

CSO Daily

November 29, 2019

Image: What it takes to be an interim CISO

What it takes to be an interim CISO

Being an interim or virtual CISO (vCISO) comes with many of the same demands of permanent security leadership roles, but also has its own unique challenges and rewards. Read more ▶

Your Must-Read Stories

•

6 top OSINT tools: Find sensitive public info before hackers do

•

How to build a Windows disaster recovery toolkit

•

5 steps to a successful red team engagement

•

How a bank got hacked

•

Emergent Android banking Trojan shows app overlay attacks are still effective

•

How to lock down enterprise web browsers

White Paper: Illumio

Decoupling Security from the Network: The Evolution of Segmentation

Enterprises are increasingly being asked to improve security protection while simultaneously maintaining business and network performance. To address this, host-based segmentation is increasing in adoption. Read more ▶

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How to build a Windows disaster recovery toolkit

How to build a Windows disaster recovery toolkit

Sooner or later, a security incident will shut down or disrupt your network. You'll be better prepared with these items in your disaster recovery toolkit. Read more ▶

 
 
Image: 5 steps to a successful red team engagement

5 steps to a successful red team engagement

You want red team pen testers to find the vulnerabilities attackers are most likely to use. Here's how. Read more ▶

Image: How a bank got hacked

How a bank got hacked

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern. Read more ▶

Image: Emergent Android banking Trojan shows app overlay attacks are still effective

Emergent Android banking Trojan shows app overlay attacks are still effective

By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks. Read more ▶

Image: How to lock down enterprise web browsers

How to lock down enterprise web browsers

Your organization's web browser is essentially your operating system for the cloud. Secure it appropriately. Read more ▶

White Paper: Illumio

How to Build a Micro-Segmentation Strategy

Security segmentation reduces your attack surface and prevents the spread of breaches inside your data center and cloud environments. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.