CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 26, 2020

7 steps to ensure a successful CISO transition

CISOs can play a critical role transitioning their replacements to the job and build a great reputation in the process. Follow this advice to ensure security operations don't miss a beat. Read more ▶

Image: Why CISOs must be students of the business

Why CISOs must be students of the business

Technical expertise will only get you so far. To earn a seat at the executive table, today's CISOs need to understand their business.

Video/Webcast | Bond

Personal Security for Employees in the New Normal

Watch the "Personal Security for Employees in the New Normal" on-demand webinar to learn about the emerging personal security challenges in the new reality. 

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

CSO50 Virtual Conference November 17-19

Join us and participate in an immersive, virtual event and learn what #CSOs and other leaders are doing to keep their organization secure. Visionary executives will talk in granular terms about the crisis management and safety strategies that are protecting their company, employees, and partners. Register now.

Solution Brief | NetEnrich

What Makes Intelligence Actionable

Learn the nuances of actionable intelligence and how to prioritize the correct threats.

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701