CSO

CSO Daily

August 23, 2019

Image: How to become a cybersecurity RSO

How to become a cybersecurity RSO

How to build a reliable security program. Read more ▶

Your Must-Read Stories

•

Why giving users two separate systems won't improve security

•

What is personally identifiable information (PII)? How to protect it under GDPR

•

How much should you spend on security?

•

Why cybersecurity is a central ingredient in evolving digital business models

•

How to market security: 8 tips for recruiting users to your cause

•

Have you been ransomware’d yet?

White Paper: FireEye

Taking Control of Security Operations

In this white paper, Taking Control of Security Operations, you will: - Learn how to improve visibility and make sense of your alert volume - Discover how to understand and anticipate attacker behavior - Find out how to integrate and automate your products and processes Read more ▶

Image: Why giving users two separate systems won't improve security

Why giving users two separate systems won't improve security

Red/green systems, which give users one system for work and another for other tasks, no longer makes sense from a security and cost perspective. There are alternatives. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: What is personally identifiable information (PII)? How to protect it under GDPR

What is personally identifiable information (PII)? How to protect it under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. That means keeping personally identifiable information (PII) safe. Here's what you need to know. Read more ▶

 
 
Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Image: Why cybersecurity is a central ingredient in evolving digital business models

Why cybersecurity is a central ingredient in evolving digital business models

Rather than being a hindrance, cybersecurity best practices give you a stable foundation on which to innovate...and can be the can be the gateway to re-imagining your business model. Read more ▶

Image: How to market security: 8 tips for recruiting users to your cause

How to market security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶

Image: Have you been ransomware’d yet?

Have you been ransomware’d yet?

You need to understand why this is one of the most potent attacks – what you must do to avoid becoming a target. Read more ▶

White Paper: FireEye

The SIEM That Cried Wolf

When security teams are only able to investigate 29% of malware alerts, how are you ensuring your SIEM is prioritizing the most important ones? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.