CSO

CSO Daily

March 05, 2020

Image: Authentication, identity management start-ups lead 2019 VC investing

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures. Read more ▶

Your Must-Read Stories

•

How to write an effective information security policy

•

CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

•

What is the dark web? How to access it and what you'll find

•

8 PCI DSS questions every CISO should be able to answer

•

How Target evolved its threat hunting program: 3 key steps

•

Do you trust your admins? 5 tips to manage administrator access

Video/Webcast: ViON Corporation and Hitachi Vantara

Building a Multi Cloud Management Strategy

Join Justin Ciaccio, Director of Commercial Sales for VION, and Howard Holton, CTO for Smart Spaces & Public Safety at Hitachi Vantara, as we discuss these developments, the associated challenges, and potential solutions. Read more ▶

Image: How to write an effective information security policy

How to write an effective information security policy

An information security policy is a high-level view of what should be done within a company in regard to information security. Here's how to create one that is an effective tool for improving your security posture. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

Lionbridge CSO & CPO Doug Graham joins host Bob Bragdon in an engaging conversation about presenting risk options to the leadership team. Read more ▶

 
 
Image: What is the dark web? How to access it and what you'll find

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed. Read more ▶

Image: 8 PCI DSS questions every CISO should be able to answer

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either self-assessments or external audits. Here's what CISOs need to know. Read more ▶

Image: How Target evolved its threat hunting program: 3 key steps

How Target evolved its threat hunting program: 3 key steps

Target decided to re-evaluate its successful threat hunting program and found it could do better. This is what they did. Read more ▶

Image: Do you trust your admins? 5 tips to manage administrator access

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that. Read more ▶

Miscellaneous: Qualys Inc

Qualys Readies its Next-Gen Vulnerability Management Offering

Qualys is launching Vulnerability Management, Detection and Response (VMDR), an upgrade to its widely used vulnerability management service that is designed to incorporate an expanded set of requirements. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com