The high price of security shaming [Infographic]

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Feb 19, 2017
Featured Image

Experts at RSA give their best cybersecurity advice

Come to the RSA show, and you’ll find plenty of cybersecurity technology. The top vendors from across the industry are here, showing products for fighting ransomware, preventing data breaches and more. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The high price of security shaming [Infographic]
Who makes better cybersecurity decisions, men or women?
Should security pros get special H-1B visa consideration?
7 ways MDM threatens employee privacy

Research/Infographic: Citrix Systems

A Day in the Life of a Remote Worker

Today's always-connected workforce demands instant, secure access to critical business apps, desktops, and data, from anywhere and from any device. Read More

Thumbnail Image
INSIDER

The high price of security shaming [Infographic]

Two-thirds of IT security professionals said they would pay an average of $124,000 to avoid public scandals associated with security breaches. Read More

Thumbnail Image

Who makes better cybersecurity decisions, men or women?

There’s a common perception that men and women make decisions differently. When high-risk decisions are being made, we need both genders in the room because these two approaches balance one another and the resulting decision will be stronger because it incorporates different approaches. Read More

Thumbnail Image
INSIDER

Should security pros get special H-1B visa consideration?

The skills, education and experience that would garner additional merit have not been discussed publicly, but some cybersecurity leaders and industry-watchers say that special consideration should be given to H-1B visa applicants with cybersecurity skills to help fill critical positions. Read More

Thumbnail Image

7 ways MDM threatens employee privacy

To understand the extent to which MDM solutions could monitor and control BYOD devices, the Bitglass research team installed MDM software on several employees’ personal mobile devices with their permission. The outcome? Complete visibility into employees’ activities, personal interests and more at the click of a button. Read More

White Paper: Citrix Systems

Best Practices to Make BYOD, CYOD and COPE Simple and Secure

Define the right bring-your-own-device (BYOD), choose-your-own-device (CYOD) and corporate-owned, personally-enabled (COPE) policies for your organization, backed by complete technologies for enterprise mobility management (EMM). Read More

Top 5 Stories

1. CrowdStrike attempts to sue NSS Labs to prevent test release, court denies request
2. Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy
3. The 7 security threats to technology that scare experts the most
4. Hot products at RSA 2017
5. How Google reinvented security and eliminated the need for firewalls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.