CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

September 07, 2020

10 value-adds that CISOs can deliver

Savvy security chiefs are generating returns for their organizations beyond enabling secure business operations. Here's how they do it. Read more ▶

What is swatting? Unleashing armed police against your enemies

Swatting is a form of harassment that uses prank calls to send police SWAT teams into victims' homes. Here's what you need to know about this dangerous practice.

9 container security tools, and why you need them

Most traditional security tools won't help with protecting container data and images. These options were built specifically for container security.

White Paper | Quest Software

You’ve identified a security issue. Now what?

Reimage threatened machines quickly and easily with the Quest® KACE® Systems Deployment Appliance.

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better aligned risk management.

4 best practices for managing and tracking SSL and TLS certificates

Do you know what SSL protocols you expose to your users? Are your settings optimized for security? Have you properly deprecated older TLS certs? Here's what you need to know.

Miscellaneous | NetEnrich

Everything you need to KNOW about cyber threats - in minutes and for free

KNOW, free threat intelligence makes it easy to dig deep into breaking news, evolving trends, and the threats and IOCs that matter to you.

IBM, Intel, AMD take different routes to hardware-based encryption

So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701