17 tools to protect your online security

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Oct 11, 2016
Featured Image

7 ways to take back control of your cloud strategy

Gaining visibility and control over cloud apps is the first step in putting IT professionals firmly in the driver’s seat with respect to cloud IT planning. Martin Johnson, Cloud Security Expert, Blue Coat discusses seven actions that will empower IT professionals in the cloud generation. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

17 tools to protect your online security
Security convergence in a utility environment
Diversity, STEM and Ada Lovelace Day

White Paper: Sapho

Accelerate Digital Transformation With Simplified Business Apps

65% of employees ignore data when making a decision and 62% delay completing tasks that require logging into multiple systems. This Forrester paper discusses how business apps are used and how the right apps will empower employees to make data-driven decisions, solve business problems, and be more connected to the business. Read More

Thumbnail Image
INSIDER

17 tools to protect your online security

Ready to get serious about online security? Start with password managers and two-factor authentication. Read More

Thumbnail Image

Security convergence in a utility environment

It used to be that physical, operational and IT security were managed in isolation. However, criminals, activists and competitors don’t think that way and will use any vulnerability to gain access to your sensitive systems or facilities. It’s important that your physical and information security methods, procedures, and safeguards are not designed in isolation. Read More

Thumbnail Image

Diversity, STEM and Ada Lovelace Day

Celebrate diversity. Get kids interested in STEM. Help them become aware of the people that are changing the world. Read More

White Paper: Red Hat

Alleviate Technical Debt

For many organizations, IT modernization comes down to deciding whether to perform top-to-bottom modernization of an organization's datacenter or to strategically modernize with those components that add efficiency, manageability, agility and cost savings to IT operations. Read More

Top 5 Stories

1. Here are the 61 passwords that powered the Mirai IoT botnet
2. These ransomware tricks fool the most hardened security pro
3. Five tips for protecting your brand on social media
4. Android malware that can infiltrate corporate networks is spreading
5. Investment fund loses $6 million in BEC scam, suspends operations

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.