Do you have an incident response plan in place?

Email not displaying correctly? View it in your browser.

CSO

CSO TechWatch

Mar 21, 2017
Featured Image

Protecting the enterprise against mobile threats

Mobile devices have transformed the digital enterprise allowing employees to access the information they need to be most productive from virtually anywhere. Has that convenience come at a cost to enterprise security, though? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Do you have an incident response plan in place?
7 tips for developing a powerful data disaster plan
Want to improve risk management? Do the basics
Is your family's cybersecurity worth $20 a month?
Zix wins 5-vendor email encryption shootout
Disaster recovery: How is your business set up to survive an outage?

eBook: Citrix Systems

The 6 Essential Requirements for Managing ADCs in Hybrid Cloud Environments

Having a local data center gives you full control over your infrastructure, but adding capacity takes massive amounts of time and money. Conversely, a cloud-based data center offers unlimited infrastructure on-demand on a pay-for-use basis, making it an attractive option. However, most organizations today can't just rely on one or the other. Read More

Thumbnail Image
INSIDER

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored. Read More

Thumbnail Image

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an affordable manner that does not break the bank. Read More

Thumbnail Image

Want to improve risk management? Do the basics

Managing security takes time and focus, but “reasonable” efforts will yield significant results, a cybersecurity panel said Wednesday at Boston College. Read More

Thumbnail Image

Is your family's cybersecurity worth $20 a month?

If you're anything like me you're probably constantly on the prowl for WiFi networks to log into so that you can work, listen to music, browse, shop or read. Without being connected to the cloud via the internet your laptop or iPad becomes a high-tech paperweight. And there are two ways that you can connect mobile devices to the internet: through a WiFi network or a cellular network. Read More

Thumbnail Image
INSIDER

Zix wins 5-vendor email encryption shootout

In this review, we looked at five email encryption products, four of which employ encryption gateways and one that’s end-to-end. The gateways usually rely on plug-ins to Outlook and browsers so you can continue using your existing email clients. The end-to-end product requires new clients for all encrypted message traffic. Read More

Thumbnail Image

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times. Read More

eBook: Citrix Systems

The ADC Guide to Managing Hybrid (IT and DevOps) Application Delivery

Together, NetScaler ADC and NetScaler MAS help IT identify faults across all of your ADC environments, enabling you to utilize the data center resources that you need so that you can maintain application performance-and keep costs down. In addition, NetScaler provides integration with automation and cloud orchestration systems to support application rollouts with self-service capabilities. Read More

Top 5 Stories

1. How to write an information security policy
2. Inside the Russian hack of Yahoo: How they did it
3. Experts divided on value of Cyber National Guard
4. Expert: Apple may have deployed unauthorized patch by mistake
5. Want good cyber insurance? Read the fine print

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO TechWatch as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.