CSO

CSO Daily

March 10, 2020

Image: Making the case for hardware 2FA in the enterprise

Making the case for hardware 2FA in the enterprise

Hardware 2FA tokens are the best and cheapest defense against phishing and credential stuffing attacks, but there are some gotchas. Read more ▶

Your Must-Read Stories

•

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

•

RSA 2020: 7 trends and takeaways

•

Top cybersecurity facts, figures and statistics for 2020

•

How Visa built its own container security solution

•

8 mobile security threats you should take seriously in 2020

•

How to be (almost) completely anonymous online

White Paper: Veeam Software Corporation & PureStorage

Veeam-Pure Storage integration

This white paper reviews the features of Veeam Availability Suite and the benefits of Pure Storage integration with Veeam’s Universal Storage API. Read more ▶

Image: Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: RSA 2020: 7 trends and takeaways

RSA 2020: 7 trends and takeaways

Attendance down, costs up, and lots of tech talk Read more ▶

 
 
Image: Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry. Read more ▶

Image: How Visa built its own container security solution

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries. Read more ▶

Image: 8 mobile security threats you should take seriously in 2020

8 mobile security threats you should take seriously in 2020

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these eight issues. Read more ▶

Image: How to be (almost) completely anonymous online

How to be (almost) completely anonymous online

The universe may believe in encryption, but it doesn't believe in anonymity. You're going to have to work for it. Read more ▶

White Paper: Veeam Software Corporation & PureStorage

Protecting mission critical data with backup and replication from Pure Storage and Veeam

The purpose of this white paper is to showcase the ease of integration, best practices and expected performance results for data backup and restore using Pure Storage FlashArray, Veeam® Backup & Replication 9.5™ and Pure Storage FlashBlade data solutions using realistic, real-world examples. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com