CSO

CSO Update

July 18, 2019

Image: Review: How Barac ETV analyzes encrypted data streams

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous. Read more ▶

Your Must-Read Stories

•

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

•

What is opsec? A process for protecting critical information

•

Why local governments are a hot target for cyberattacks

•

Does it matter who the CISO reports to?

•

How to evaluate SOC-as-a-service providers

•

Why unauthenticated SMS is a security risk

eBook: Salesforce.com

The Age of the Customer-Centric CIO

In today’s Digital Age, companies that listen to their customers, are adept at solving those customers’ pain points, and deliver relevant and immersive experiences have the advantage. With customer-centricity rising to the top of the CEO agenda, the CIO is well positioned to lead the charge. Read more ▶

Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: What is opsec? A process for protecting critical information

What is opsec? A process for protecting critical information

Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden. Read more ▶

 
 
Image: Why local governments are a hot target for cyberattacks

Why local governments are a hot target for cyberattacks

Recent ransomware and other attacks underscore the value attackers see in the data stored in city and regional government systems. Here's why they are vulnerable and what they can do to reduce the threat. Read more ▶

Image: Does it matter who the CISO reports to?

Does it matter who the CISO reports to?

Reporting relationships are more than lines on an org chart, they're lines of authority. Ultimately, who the CISO reports to may say more about an organization's maturity than it does about an individual's effectiveness. Read more ▶

Image: How to evaluate SOC-as-a-service providers

How to evaluate SOC-as-a-service providers

Not every organization that needs a security operations center can afford to equip and staff one. A number of providers provide SOC as a service. Here's what you need to know about them. Read more ▶

Image: Why unauthenticated SMS is a security risk

Why unauthenticated SMS is a security risk

Multifactor authentication that uses SMS messaging as a second factor is vulnerable to simple hacks. User education is the best defense. Read more ▶

White Paper: CBTS

The Solution to Removing Network- Related Barriers to Business Goals

As organizations evolve in the new digital era, the networks that drove their business forward in the past are now slowing them down. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.