CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

June 30, 2020

10 essential negotiation tactics CISOs should know

Lose that winner takes all mentality and build your negotiation muscle with advice from security leaders and negotiation experts. Read more ▶

White Paper | Quest Software

5 Steps to Battle Cybercrime with Unified Endpoint Management

This five-step strategy offers peace of mind that your endpoints and network are protected from cyberattacks.

New Republican bill latest in long line to force encryption backdoors

Here we go again. Senate Republicans push a new bill to mandate "lawful access" to encrypted devices and data. It won't end until law enforcement has better cyber forensics capabilities.

How do you secure the cloud? New data points a way

New reports show big differences in risk among public, private and hybrid cloud deployments. Here’s advice on the tools, information and organizational structure needed to execute a successful cloud security strategy.

Data security risks threaten approval of Chinese undersea cable plan

The US government's "Team Telecom" wants to partially deny a proposed undersea cable connection between the US and Hong Kong over surveillance, data theft concerns.

White Paper | Quest Software

Simple, secure mobile device management

This white paper unravels the complexities of mobile endpoint management and explains the risks of not protecting your mobile device fleet.

Free security resources for work-from-home employees during the COVID-19 crisis

Some security vendors are stepping up to help organizations better protect their networks as employees must suddenly work from home.

Want better mobile security or privacy? Try these Android and iOS alternatives

GrapheneOS offers hardened security over Android, while /e/OS locks down your private information. The main trade-off for both is fewer apps.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701