CSO

CSO Update

August 18, 2019

Image: Safe travels: 7 best practices for protecting data at border crossings

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more ▶

Your Must-Read Stories

•

Best antivirus software: 14 top tools

•

Review: How Perimeter 81 provides a near plug-and-play network security service

•

12 things every computer security pro should know

•

Developing personal OPSEC plans: 10 tips for protecting high-value targets

•

Built to scale: 5 tips for structuring your security organization for growth

•

The CSO guide to top security conferences, 2019

White Paper: Atmosera

Best Practices: Enterprise Cloud Migration to Azure

As companies look to move workloads to the Microsoft Azure public cloud platform, having a well-constructed strategy is critical to realizing the transformative power the cloud offers. Read more ▶

Image: Best antivirus software: 14 top tools

Best antivirus software: 14 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance, and usability. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Review: How Perimeter 81 provides a near plug-and-play network security service

Review: How Perimeter 81 provides a near plug-and-play network security service

Starting with the concept of zero trust, VPN tunneling and secure network access as a service, Perimeter 81 is now providing an almost plug-and-play solution for more elements of cybersecurity served through the cloud and on demand. Read more ▶

 
 
Image: 12 things every computer security pro should know

12 things every computer security pro should know

Fighting the good fight takes specialized knowledge. Here's the baseline of what all security pros should know. Read more ▶

Image: Developing personal OPSEC plans: 10 tips for protecting high-value targets

Developing personal OPSEC plans: 10 tips for protecting high-value targets

Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans. Read more ▶

Image: Built to scale: 5 tips for structuring your security organization for growth

Built to scale: 5 tips for structuring your security organization for growth

How to prepare your SOC for mergers, new business innovation and a constantly changing and growing attack surface. Read more ▶

Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

White Paper: GEP Global

The Data-Centric Supply Chain: Whats CIOs Should Know

Customers have shifted the demand model, and companies must transform the supply chain. That requires an “outside-in” approach: start at the customer, then work backward while breaking down data silos. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.