CSO

CSO Daily

October 14, 2019

Image: 6 top OSINT tools: Find sensitive public info before hackers do

6 top OSINT tools: Find sensitive public info before hackers do

Hackers use open source intelligence to find information that will help them compromise systems. Using these tools will tell you how much of that info is exposed. Read more ▶

Your Must-Read Stories

•

Equifax data breach FAQ: What happened, who was affected, what was the impact?

•

11 top cloud security threats

•

Rebuilding after NotPetya: How Maersk moved forward

•

Security spending up, but adoption of cutting-edge tools is slow

•

3 actions to take during cybersecurity awareness month

•

Podcast: Mastercard Uses Hybrid Cloud to Meet Strict Requirements for Data Security

White Paper: WEI, a Hewlett Packard Enterprise Platinum Partner

Break Free from Hybrid Cloud Barriers

Read this white paper to explore the three hybrid cloud roadblocks you can avoid with as-a-service hybrid cloud platforms that accelerate adoption Read more ▶

Image: Equifax data breach FAQ: What happened, who was affected, what was the impact?

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: 11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

 
 
Image: Rebuilding after NotPetya: How Maersk moved forward

Rebuilding after NotPetya: How Maersk moved forward

In the wake of NotPetya attacks, Maersk’s IT and security teams embraced transparency, greater collaboration with business, and a risk-based approach. Read more ▶

Image: Security spending up, but adoption of cutting-edge tools is slow

Security spending up, but adoption of cutting-edge tools is slow

While security budgets are expected to increase over the next year, it’s not clear that spending is aimed at the right problems or that IT is up-to-date on the latest security practices. (Download our research report.) Read more ▶

Image: 3 actions to take during cybersecurity awareness month

3 actions to take during cybersecurity awareness month

Based on recent research, improving cybersecurity awareness among business executives, CIOs, and, yes, infosec professionals should be a goal for any organization. Read more ▶

Image: Podcast: Mastercard Uses Hybrid Cloud to Meet Strict Requirements for Data Security

BrandPost Sponsored by HPE

Podcast: Mastercard Uses Hybrid Cloud to Meet Strict Requirements for Data Security

Learn how the company's leading-edge use of hybrid cloud helps it meet strict requirements for data sovereignty, security, and performance. Read more ▶

eBook: Certify

2019 Travel & Expense Management Trends Report

Business travel serves many functions and impacts a wide range of business objectives from bolstering sales to strengthening partnerships, training, customer service, and professional development. Yet many companies fail to invest in streamlining their T&E management. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.