CSO

The day's top cybersecurity news and in-depth coverage

CSO Daily

August 24, 2020

IBM, Intel, AMD take different routes to hardware-based encryption

So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs. Read more ▶

Image: 7 things to consider when choosing managed detection and response

7 things to consider when choosing managed detection and response

Many organizations lack the internal expertise to address threat detection and response effectively; MDR can fill the gap. Here’s what to look for when you shop for MDR services.

A 10-point plan for addressing WFH cybersecurity challenges

Back in early Spring, ensuring users could access the necessary applications securely from home was priority No. 1. Now, 3-4 months later, work from home looks like it's here to stay … for a while, at least. Here's your to-do list for the next 6 months and beyond.

How to make your security team more business savvy

CISOs are finding ways to inject more business skills into their teams through recruitment, training and staffing strategies that broaden workers’ horizons — strategies that they say are paying off with stronger security and better aligned risk management.

5 risk management mistakes CISOs still make

Cybersecurity is now a board-level issue, but many organizations still struggle to get security risk management right.

The cybersecurity skills shortage is getting worse

New research from ESG and ISSA illustrates a lack of advancement in bridging the cybersecurity skill shortage gap.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701