Creating metrics to indicate risk

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jan 21, 2018
Featured Image

A newcomer's guide to the dark web

If you can tolerate the lousy performance, unpredictable availability, and occasional shock factor of the dark web, it’s worth a visit. Just don’t buy anything there. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Creating metrics to indicate risk
How to write a CISO job description
Review: Calling Barracuda's WAF a firewall is seriously selling it short
OnePlus says up to 40,000 customers affected by credit card breach
Review: Mantix4 provides threat hunting as a service
What is identity management? IAM definition, uses, and solutions

White Paper: jamf

Apple Device Management for Beginners

While some are very familiar with Apple already, many of you are diving into Apple device management for the first time. Read More

Thumbnail Image

Creating metrics to indicate risk

How to engage with the C-Suite on cyber risk management Read More

Thumbnail Image
INSIDER

How to write a CISO job description

The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role. Read More

Thumbnail Image
INSIDER

Review: Calling Barracuda's WAF a firewall is seriously selling it short

The Barracuda Web Application Firewall (WAF) is more than a firewall, it's like the core of an independent bastion of cybersecurity, able to inspect both inbound and outgoing traffic. Read More

Thumbnail Image

OnePlus says up to 40,000 customers affected by credit card breach

OnePlus, the company behind a popular line of Android devices, said on Friday that up to 40,000 customers might be at risk after a malicious script compromised payment card data during the checkout process. Read More

Thumbnail Image
INSIDER

Review: Mantix4 provides threat hunting as a service

Mantix4 provides robust threat hunting tools for use by clients, but it also takes threat hunting into the software as a service (SaaS) realm, employing a team of experts to hunt on the client's behalf. Read More

Thumbnail Image

What is identity management? IAM definition, uses, and solutions

Identity and access management products provide IT managers with tools and technologies for controlling user access to critical information within an organization. Read More

eBook: Citrix Systems Inc

Beyond the Cubicle: Life in the Digital Workspace

The concept of "work" is changing. These days, rarely is the modern workplace a static location where employees go everyday to be productive. Brick and mortar, cubicles, and supply closets are being supplanted by secure, digital workspaces with an abundance of virtual tools. Read More

CSO Insider

1. Top security certifications: Who they're for, what they cost, and which you need
2. How to jumpstart your infosec career
3. For strong API security, you need a program not a piecemeal approach
4. Security platform or best of breed? There’s only one answer
5. Keeping pace with security automation

Editor's Picks

1. What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)
2. Meltdown and Spectre patches: Where to start and what to expect
3. The dirty dozen: 12 top cloud security threats for 2018
4. Best Android antivirus? The top 10 tools
5. The 6 best password managers
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.