CSO

CSO Update

March 05, 2020

Image: How to write an effective information security policy

How to write an effective information security policy

An information security policy is a high-level view of what should be done within a company in regard to information security. Here's how to create one that is an effective tool for improving your security posture. Read more ▶

Your Must-Read Stories

•

Authentication, identity management start-ups lead 2019 VC investing

•

Do you trust your admins? 5 tips to manage administrator access

•

The CSO's playbook for forging board relationships

•

What is the dark web? How to access it and what you'll find

•

4 ways 5G will change your enterprise threat model

•

CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

Video/Webcast: ViON Corporation and Hitachi Vantara

Building a Multi Cloud Management Strategy

Join Justin Ciaccio, Director of Commercial Sales for VION, and Howard Holton, CTO for Smart Spaces & Public Safety at Hitachi Vantara, as we discuss these developments, the associated challenges, and potential solutions. Read more ▶

Image: Authentication, identity management start-ups lead 2019 VC investing

Authentication, identity management start-ups lead 2019 VC investing

Cybersecurity venture investments reached nearly $7 billion in 2019. Authentication and identity management start-ups were the top lures. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Do you trust your admins? 5 tips to manage administrator access

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that. Read more ▶

 
 
Image: The CSO's playbook for forging board relationships

The CSO's playbook for forging board relationships

Security is a board-level concern, but many aren’t confident they have the information and processes to provide effective governance. This nine-point plan will help you cement your role as a trusted advisor. Read more ▶

Image: What is the dark web? How to access it and what you'll find

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed. Read more ▶

Image: 4 ways 5G will change your enterprise threat model

4 ways 5G will change your enterprise threat model

The benefits that fifth-generation cellular networks will enable come with security risks that organizations need to pay attention to right now. Read more ▶

Image: CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

CSO Executive Sessions, Episode 4: Reducing risk vs. enabling the business

Lionbridge CSO & CPO Doug Graham joins host Bob Bragdon for an engaging conversation about presenting risk options to the rest of the leadership team. Read more ▶

Miscellaneous: Qualys Inc

Qualys Readies its Next-Gen Vulnerability Management Offering

Qualys is launching Vulnerability Management, Detection and Response (VMDR), an upgrade to its widely used vulnerability management service that is designed to incorporate an expanded set of requirements. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com