CSO

CSO Update

August 15, 2019

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Your Must-Read Stories

•

Review: How Perimeter 81 provides a near plug-and-play network security service

•

Built to scale: 5 tips for structuring your security organization for growth

•

Stealing money in the digital age: The dark industry of trafficking financial data

•

What is a CASB? What you need to know before you buy

•

6 lessons from Venmo’s lax approach to API security

•

How MIT's Fiat Cryptography might make the web more secure

White Paper: Riverbed Technology

Gartner Report: Survival Guide for Application Leaders Evaluating and Implementing Microsoft Office 365

According to Gartner, "Microsoft Office 365 has excited many executives and application leaders with promises of more flexible collaboration and new ways to work. But behind the scenes, many owners of Office 365 are just trying to survive the difficult transition. Read more ▶

Image: Review: How Perimeter 81 provides a near plug-and-play network security service

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

 
 
Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

Image: What is a CASB? What you need to know before you buy

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems. Read more ▶

Image: 6 lessons from Venmo’s lax approach to API security

6 lessons from Venmo’s lax approach to API security

Cyber criminals are targeting application programming interfaces to steal sensitive data. Recent exposures and hacks at companies like Venmo, Facebook and Google present lessons to improve API security. Read more ▶

Image: How MIT's Fiat Cryptography might make the web more secure

How MIT's Fiat Cryptography might make the web more secure

By automating the writing of cryptographic algorithms, Fiat Cryptography can remove errors, produce more secure code, and boost performance. Read more ▶

White Paper: Riverbed Technology

Gartner Report: Broaden APM to Support Digital Business Transformation

Application Performance Monitoring (APM) capabilities have expanded considerably over the last three years, but the percentage of applications monitored in an enterprise has not. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.