Security pros choose their top enterprise-class cybersecurity vendors

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Aug 15, 2017
Featured Image

How to protect personally identifiable information under GDPR

The EU's General Data Protection Regulation requires companies to protect the privacy of their EU customers. Here's what you need to know. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security pros choose their top enterprise-class cybersecurity vendors
Security executives on the move and in the news
Acalvio weaves a web of deception on demand
Top 5 container mistakes that cause security problems

White Paper: Motorola Solutions Inc

Beyond System Logs Using Advanced Analytics

Your Land Mobile Radio system is a wealth of network management data. To get the most out of your LMR system, you need to go beyond merely scanning system logs. Discover how advanced analytics can transform your network management from reactive to proactive, and improve overall system performance. Read More

Thumbnail Image

Security pros choose their top enterprise-class cybersecurity vendors

Cisco, IBM, Symantec and McAfee lead the cybersecurity vendors in mind share, but the race has just begun. Read More

Thumbnail Image

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments. Read More

Thumbnail Image
INSIDER

Acalvio weaves a web of deception on demand

In cyber security, nothing remains static for very long, and already new contenders are emerging with completely different takes on how deception technology should be successfully deployed. We took ShadowPlex from Acalvio for a spin to see how the product adds artificial intelligence, wizards and the concept of deception on demand into the mix. Read More

Thumbnail Image

Top 5 container mistakes that cause security problems

As enterprises increase their adoption of containers, they are also increasing the number of security mistakes they make with the technology. Read More

White Paper: Motorola Solutions Inc

Critical Steps to Prevent Network Downtime

80% of government IT leaders experienced at least 1 critical network outage in the last 3 months. 1/3 of these events required at least one day to resolve. Mission-critical networks require constant maintenance. No matter the technology, network downtime will occur. Is your network ready? Read More

CSO Insider

1. Database security face-off: IBM Guardium vs. Imperva SecureSphere Database Security
2. State of Cybercrime 2017: Security events decline, but not the impact
3. Container security: How Waratek blocks Java exploits
4. Patrolling network traffic with SecBI
5. Lacework unmasks hidden attackers amid data center and cloud chaos

Editor's Picks

1. Malicious code in the Node.js npm registry shakes open source trust model
2. The 10 Windows group policy settings you need to get right
3. Separation of duties and IT security
4. Why SSL/TLS attacks are on the rise
5. IT's 9 biggest security threats
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.