CSO

CSO Daily

August 15, 2019

Image: Safe travels: 7 best practices for protecting data at border crossings

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more ▶

Your Must-Read Stories

•

12 things every computer security pro should know

•

Review: How Perimeter 81 provides a near plug-and-play network security service

•

Built to scale: 5 tips for structuring your security organization for growth

•

Developing personal OPSEC plans: 10 tips for protecting high-value targets

•

Best tools for single sign-on (SSO)

•

How to close SIEM visibility gaps created by legacy apps

White Paper: Riverbed Technology

Gartner Report: Survival Guide for Application Leaders Evaluating and Implementing Microsoft Office 365

According to Gartner, "Microsoft Office 365 has excited many executives and application leaders with promises of more flexible collaboration and new ways to work. But behind the scenes, many owners of Office 365 are just trying to survive the difficult transition. Read more ▶

Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Review: How Perimeter 81 provides a near plug-and-play network security service

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand. Read more ▶

 
 
Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Image: Best tools for single sign-on (SSO)

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider. Read more ▶

Image: How to close SIEM visibility gaps created by legacy apps

How to close SIEM visibility gaps created by legacy apps

It's often difficult to make log files and other data from legacy applications accessible to security information and event management systems. Here are some options for improving visibility. Read more ▶

White Paper: Riverbed Technology

Gartner Report: Broaden APM to Support Digital Business Transformation

Application Performance Monitoring (APM) capabilities have expanded considerably over the last three years, but the percentage of applications monitored in an enterprise has not. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.