CSO

CSO Daily

August 30, 2019

Image: Data privacy in the IoT age: 4 steps for reducing risk

Data privacy in the IoT age: 4 steps for reducing risk

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company. Read more ▶

Your Must-Read Stories

•

What is the cost of a data breach?

•

Why you need a cybersecurity incident response specialist

•

Can VMware become a leading cybersecurity vendor?

•

Capital One hack shows difficulty of defending against irrational cybercriminals

•

3 leading network access control products reviewed

•

Participate in our 2019 Customer Engagement Research

Miscellaneous: Dell EMC and VMware

The Business Value of Transforming IT Through HCI

This infographic looks at the business value organizations can gain from transforming their IT using Dell’s hyper-converged infrastructure (HCI) solutions. Read more ▶

Image: What is the cost of a data breach?

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: Why you need a cybersecurity incident response specialist

Why you need a cybersecurity incident response specialist

If your cyber insurance provider gives you the number of an incident response specialist, call them now. It will save time when an attack occurs. Read more ▶

 
 
Image: Can VMware become a leading cybersecurity vendor?

Can VMware become a leading cybersecurity vendor?

VMware's recent acquisition of Carbon Black gives the company a strong security foundation to build on. Read more ▶

Image: Capital One hack shows difficulty of defending against irrational cybercriminals

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns. Read more ▶

Image: 3 leading network access control products reviewed

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.) Read more ▶

Image: Participate in our 2019 Customer Engagement Research

Participate in our 2019 Customer Engagement Research

CSO's parent company IDG is conducting its annual Customer Engagement survey to better understand the content preferences of IT decision-makers like yourself. We value your insight and invite you to participate in the survey. Thank you for contributing to the success of our research! Read more ▶

White Paper: Dell EMC and VMware

Live Optics: How to Assess Workload Performance for Data-Driven IT Decisions

Reading between the lines of workload data is the key to making valuable purchase decisions, but it’s not always an easy thing to do. Inside, learn about lightweight software designed to analyze devices, operating systems, and data center infrastructure and provide a visual workload performance summary that spans the entire IT environment – giving you the insight and tactical information needed to make valuable investment choices. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.