CSO

CSO Daily

July 01, 2019

Image: 7 keys to a successful IT security career

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field. Read more ▶

Your Must-Read Stories

•

Whip your information security into shape with ISO 27001

•

What is a side channel attack? How these end-runs around encryption put everyone at risk

•

11 questions to ask before buying AI-enabled security software

•

Does it matter who the CISO reports to?

•

Why security-IT alignment still fails

•

3 ways to monitor encrypted network traffic for malicious activity

White Paper: NICE Ltd

Diversity in the Digital Workplace

Robotic Process Automation (RPA) is here to stay, and organizations who embrace and integrate an intelligent robotic workforce into the workplace have the potential to catapult themselves into the digital age. Read more ▶

Image: Whip your information security into shape with ISO 27001

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular information security standards around — and it works for any size business. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is a side channel attack? How these end-runs around encryption put everyone at risk

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more ▶

 
 
Image: 11 questions to ask before buying AI-enabled security software

11 questions to ask before buying AI-enabled security software

Infosec is complicated enough. Add AI/ML into your security software mix, and you may be asking for trouble. Or, choose the right vendor, and you could wind up with the best toys on the block. Here's what you need to know to wind up in the second camp. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: Why security-IT alignment still fails

Why security-IT alignment still fails

Many organizations struggle to get IT and security on the same page and stay in synch as their enterprises speed ahead with digital transformation initiatives. Here's how to overcome some of the most common obstacles. Read more ▶

Image: 3 ways to monitor encrypted network traffic for malicious activity

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

White Paper: BlackBerry

File Sharing Without Fear: 5 Key Requirements for Law Firms When Choosing a Content Collaboration Platform

In today’s mobile, collaborative legal environments, any workforce productivity or cybersecurity strategy is incomplete without a secure content collaboration platform (also referred to as Enterprise File Sync & Share (EFSS) solutions). Attorneys need anytime, anywhere document access and collaboration across all their devices – especially for the most sensitive files – to keep pace with the demands of their profession. They also need to keep those files safe. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.