CSO

CSO Daily

August 16, 2019

Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

Your Must-Read Stories

•

Best antivirus software: 14 top tools

•

Evaluating DNS providers: 4 key considerations

•

Review: How Barac ETV analyzes encrypted data streams

•

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

•

California Consumer Privacy Act (CCPA): What you need to know to be compliant

•

How to manage Microsoft's BitLocker encryption feature

Miscellaneous: Möbius Partners, a Hewlett Packard Enterprise Platinum Partner

How to Prepare for Windows Server 2008 End of Support

Read this one-pager to learn how migrating to Windows Server 2016 or Windows Server 2019 on HPE ProLiant Gen10 Servers, powered by Intel® Xeon® Scalable processors, helps businesses keep pace with evolving cyberthreats. Read more ▶

Image: Best antivirus software: 14 top tools

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Evaluating DNS providers: 4 key considerations

Evaluating DNS providers: 4 key considerations

DNS attacks are increasing, Is your Domain Name System implementation up to snuff? Here's what you need to know to make sure you have the provider right for you. Read more ▶

 
 
Image: Review: How Barac ETV analyzes encrypted data streams

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous. Read more ▶

Image: What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

Information Sharing and Analysis Organizations were created to make cyber threat data and best practices more accessible than with Information Sharing and Analysis Centers, but results are mixed. Read more ▶

Image: California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read more ▶

Image: How to manage Microsoft's BitLocker encryption feature

How to manage Microsoft's BitLocker encryption feature

Enterprises with many Windows devices might struggle to know which have BitLocker enabled or where to find BitLocker recovery keys. These techniques can help. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.