CSO

CSO Update

June 18, 2019

Image: 6 signs the CIO-CISO relationship is broken — and how to fix it

6 signs the CIO-CISO relationship is broken — and how to fix it

Successful collaboration between the IT and security leaders is essential but not always easy. Here are signs the relationship is broken – and 8 steps you should take to fix it. Read more ▶

Your Must-Read Stories

•

DNS hijacking grabs headlines, but it’s just the tip of the iceberg

•

How to prepare a SOC-as-a-service RFP

•

12 tips for effectively presenting cybersecurity to the board

•

How Akamai implemented a zero-trust model

•

The dirty dozen: 12 top cloud security threats

•

Why unauthenticated SMS is a security risk

White Paper: CDW & Cisco Systems

Changing the Way Users Work

The Modern Workforce Insight Report explores how the workforce is evolving. How it’s being shaped by both technology and culture, how companies are adapting and some of the challenges — and opportunities — that it presents. Read more ▶

Image: DNS hijacking grabs headlines, but it’s just the tip of the iceberg

DNS hijacking grabs headlines, but it’s just the tip of the iceberg

DNS pioneer Paul Vixie contemplates missed opportunities for improving internet security and advocates for widespread use of DNSSEC, which he helped create, and which he believes would go a long way toward improving DNS security. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: How to prepare a SOC-as-a-service RFP

How to prepare a SOC-as-a-service RFP

Here's how one company structured its SOCaaS request for proposal document. Key takeaway: Don't be afraid to ask for too many details. Read more ▶

 
 
Image: 12 tips for effectively presenting cybersecurity to the board

12 tips for effectively presenting cybersecurity to the board

Don't let your board presentation miss the mark. Follow these best practices and common mistakes to avoid when communicating cybersecurity risk to the board. Read more ▶

Image: How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement. Read more ▶

Image: The dirty dozen: 12 top cloud security threats

The dirty dozen: 12 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

White Paper: Threat Quotient

5 Steps to Making Better Security Decisions

In this report, we define a process for making better decisions faster, first by addressing alert fatigue to make better decisions, and then by introducing situational understanding to make these decisions faster. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.