CSO

CSO Update

August 13, 2019

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

Your Must-Read Stories

•

Review: How Nyotron Paranoid puts endpoint security worries to rest

•

11 new state privacy and security laws explained: Is your business ready?

•

Know your Edge Chromium security options

•

Famous social engineering attacks: 12 crafty cons

•

Smishing and vishing: How these cyber attacks work and how to prevent them

•

Stealing money in the digital age: The dark industry of trafficking financial data

White Paper: Dell Technologies and Intel®

Cyber Resilient Security in 14th

As servers become more critical in a software-defined datacenter architecture, server security becomes the foundation of overall enterprise security. Servers must emphasize security at both the hardware and firmware level by leveraging an immutable Root-of-Trust that can be used to verify subsequent operations within the server. This establishes a chain of trust that extends throughout the server lifecycle, from deployment through maintenance to decommissioning. The 14th generation of PowerEdge servers deliver this chain of trust and combine it with comprehensive management tools to provide robust layers of security across hardware and firmware. Download this whitepaper from Dell EMC and Intel® to learn more. Read more ▶

Image: Review: How Nyotron Paranoid puts endpoint security worries to rest

Review: How Nyotron Paranoid puts endpoint security worries to rest

Adding an extra layer of endpoint protection isn't just for the overly cautious. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: 11 new state privacy and security laws explained: Is your business ready?

11 new state privacy and security laws explained: Is your business ready?

States from Maine to California have recently enacted privacy, data security, cybersecurity, and data breach notification laws. Let's break down what each of these laws entails and how businesses and consumers are affected. Read more ▶

 
 
Image: Know your Edge Chromium security options

Know your Edge Chromium security options

Microsoft's upcoming Chromium-based Edge browser will give Edge- and Chrome-like web security features to older versions of Microsoft Windows. Here's what you need to know. Read more ▶

Image: Famous social engineering attacks: 12 crafty cons

Famous social engineering attacks: 12 crafty cons

This rogues gallery of social engineering attack examples made headlines by taking advantage of human nature. Read more ▶

Image: Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing: How these cyber attacks work and how to prevent them

Smishing and vishing are types of phishing attacks that try to lure victims via SMS message and voice calls. Both rely on the same emotional appeals employed in traditional phishing scams and are designed to drive you into urgent action. The difference is the delivery method. Read more ▶

Image: Stealing money in the digital age: The dark industry of trafficking financial data

Stealing money in the digital age: The dark industry of trafficking financial data

Cybercriminal gangs dealing in credit card and other financial data have refined their tools and changed their ideology for more profitable attacks. Read more ▶

White Paper: Dell Technologies and Intel®

Maximize Your Storage Capacity with the Dell EMC Unity 550F All-Flash Array

Taking into account time and budgetary constraints, most organizations can’t afford to make mistakes about where and how they allocate resources for storage. This means storage solutions must be sourced and operate efficiently, as well as eliminate the top two challenges many IT leaders cite as hindrances to their infrastructure: aging equipment and inadequate storage capacity. Download this white paper from Dell EMC and Intel® to learn more. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.