CSO

CSO Update

December 04, 2018

Image: 7 warning signs of an insider threat

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company. Read more ▶

Your Must Read Stories

•

7 warning signs of an insider threat

•

Career advice: Good enough security trumps best security

•

6 mobile security threats you should take seriously in 2019

•

Review: Protecting multi-cloud environments with Threat Stack

•

IAM for IoT: Taming the internet of threats

•

Risk-based vulnerability management a better form of cyber defense

•

The CSO guide to top security conferences, 2018-19

White Paper: Cohesity

Solution Brief: Bringing Enterprise Grade Capabilities to the Public Cloud for Secondary Data

Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however weren’t architected with the cloud in mind. Read more ▶

Image: Career advice: Good enough security trumps best security

Career advice: Good enough security trumps best security

The realization that most of the world doesn’t want the best security will help you advance in your security career. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: 6 mobile security threats you should take seriously in 2019

6 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these issues in the coming year. Read more ▶

 
 
Image: Review: Protecting multi-cloud environments with Threat Stack

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted. Read more ▶

Image: IAM for IoT: Taming the internet of threats

IAM for IoT: Taming the internet of threats

We don’t simply give users credentials and allow unfettered access to the network, why wouldn't we apply the same controls to a networked device? Read more ▶

Image: Risk-based vulnerability management a better form of cyber defense

Risk-based vulnerability management a better form of cyber defense

By consolidating vulnerability management tools and adding AI, risk-based vulnerability management protects the entire attack surface. Read more ▶

Image: The CSO guide to top security conferences, 2018-19

The CSO guide to top security conferences, 2018-19

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

Case Study: Cohesity

UCSB Consolidates Their Data Protection on Cohesity's Single, Web-Scale Platform

Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting. Read more ▶

You are currently subscribed to Editorial - CSO Update as newsletter@newslettercollector.com.
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.