Information security in a war zone: How the Red Cross protects its data

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jun 12, 2018
Featured Image
INSIDER

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Information security in a war zone: How the Red Cross protects its data
Ready for more secure authentication? Try these password alternatives and enhancements
GDPR is live! – Now what?
What is the New York Cybersecurity Regulation? What you need to do to comply
The IoT security basics survival guide
Best security software: How 12 cutting-edge tools tackle today's threats

Case Study: Spectrum Enterprise

Nonstop Digital Connectivity Fires Up Fans and Revenue

H&S's performance is measured by attendance, big-name bookings and how much fans spend on merchandise and concessions. Digital innovation plays a crucial role in creating a thrilling live experience that raises fans' satisfaction and their average "spend." Read More

Thumbnail Image
INSIDER

Information security in a war zone: How the Red Cross protects its data

The International Committee of the Red Cross faces unique and extreme security threats across the globe. Technology is not always the best defense. Read More

Thumbnail Image
INSIDER

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation. Read More

Thumbnail Image

GDPR is live! – Now what?

GDPR rules are a hot mess. Get clarity by further identifying all your GDPR weak spots. Read More

Thumbnail Image
INSIDER

What is the New York Cybersecurity Regulation? What you need to do to comply

Officially called 23 NYCRR 500, this regulation requires financial services firms doing business in New York to have a full security risk assessment and plan. Read More

Thumbnail Image
INSIDER

The IoT security basics survival guide

The Internet of Things presents significant security challenges to businesses of all types. Here’s what everyone needs to understand about IoT and its risks. Read More

Thumbnail Image

Best security software: How 12 cutting-edge tools tackle today's threats

In these security software reviews, we go hands-on with some of the most innovative, useful and, arguably, best security software from today's most important cybersecurity technology categories. Read More

White Paper: Webroot Software

Why Efficacy is Paramount

Malware detection itself is not the only factor to consider when choosing an endpoint security solution. In addition to initial detection, comprehensive endpoint security must a number of things. Read more to find out. Read More

CSO Insider

1. Cloud functions present new security challenges
2. 5 tips to thwart medical device attacks
3. 14 top tools to assess, implement, and maintain GDPR compliance
4. Review: Seceon soups up standard SIEM
5. CSO Spotlight: Grant Bourzikas, McAfee

Editor's Picks

1. How to evaluate web authentication methods
2. The best new Windows 10 security features: The privacy edition
3. What is a CISO? And what it takes to become one
4. 7 highest-paying IT security jobs, 2018
5. What is cryptojacking? How to prevent, detect, and recover from it
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.