CSO

CSO Daily

July 19, 2019

Image: Security software reviews, 2019: Lab tests of today's top tools

Security software reviews, 2019: Lab tests of today's top tools

We go hands-on with some of the most innovative, useful and, arguably, best security software on the market. Read more ▶

Your Must-Read Stories

•

California Consumer Privacy Act (CCPA): What you need to know to be compliant

•

Review: How Barac ETV analyzes encrypted data streams

•

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

•

How Akamai implemented a zero-trust model

•

What is the EU's revised Payment Services Directive (PSD2) and its impact?

•

9 types of malware and how to recognize them

Miscellaneous: Cradlepoint Technology

2019 State of the WAN Report

Based on a widespread industry survey, this IDG and Cradlepoint report reflects and explores the changing role of LTE in the enterprise. Read more ▶

Image: California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change. Read more ▶

Image: Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

DEALPOST

Buy More, Save More -- This HP Coupon Code Cuts Prices on Business PCs

Configure your new business PC to $599+ and save $60. Create a $1299 configuration and save $150. Spend $1,999 and save $350. For a limited time, and only with this coupon code. Read more ▶

Image: Review: How Barac ETV analyzes encrypted data streams

Review: How Barac ETV analyzes encrypted data streams

Barac’s Encrypted Traffic Visibility Platform can halt encrypted attacks — without breaking the encryption. In our tests, the results seemed mostly instantaneous. Read more ▶

 
 
Image: 4 signs the CISO-board relationship is broken (and 3 ways to fix it)

4 signs the CISO-board relationship is broken (and 3 ways to fix it)

Gaining the board's trust is key for elevating the security function to a strategic level. To do that, CISOs will need to get out of their technical comfort zone. Read more ▶

Image: How Akamai implemented a zero-trust model

How Akamai implemented a zero-trust model

An effort that was triggered by a nation-state attack nine years ago has fundamentally transformed how people and devices access apps and services, limiting damage from lateral movement. Read more ▶

Image: What is the EU's revised Payment Services Directive (PSD2) and its impact?

What is the EU's revised Payment Services Directive (PSD2) and its impact?

The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere. Read more ▶

Image: 9 types of malware and how to recognize them

9 types of malware and how to recognize them

Think you know your malware? Here's a refresher to make sure you know what you're talking about — with basic advice for finding and removing malware when you've been hit Read more ▶

Miscellaneous: Cradlepoint Technology

The Pathway to 5G

This report investigates where 5G is today, the significant and revolutionizing components of 5G, and how it will shape the future of networking. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.