CSO

CSO Daily

October 28, 2019

Image: Stop ignoring printer security: It's time for CSOs to take control

Stop ignoring printer security: It's time for CSOs to take control

Despite shipping with mature security features, most printer deployments are insecure because of misplaced financial and organizational incentives. Read more ▶

Your Must-Read Stories

•

4 big changes coming to cybersecurity in 2020 and beyond

•

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

•

8 questions to answer before paying a ransomware demand

•

Cell phones don't belong in SCIFs, says Republican congressman

•

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

•

How to audit permissions after a Windows migration

White Paper: TechPower, a Hewlett Packard Enterprise Platinum Solution Provider

HPE InfoSight: Artificial Intelligence for your Hybrid Cloud World

Read this white paper to learn how cloud-based predictive analytics can free up your time, letting you focus on more strategic initiatives. TechPower helps its customers successfully transform to a hybrid infrastructure. Read more ▶

Image: 4 big changes coming to cybersecurity in 2020 and beyond

4 big changes coming to cybersecurity in 2020 and beyond

The pace of technology and market changes will pick up in 2020, impacting security technologies, innovation, investment, and the industry at large. Read more ▶

Image: 1Password is changing the way enterprises secure their data

DEALPOST

1Password is changing the way enterprises secure their data

1Password Advanced Protection provides extensive monitoring tools, giving you control of your security. Read more ▶

Image: China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

China’s MLPS 2.0: Data grab or legitimate attempt to improve domestic cybersecurity?

The new version China’s Multi-Level Protection Scheme (MLPS) expands what companies fall under its purview and lower the threshold for government inspection. Should companies with operations in China be concerned? Read more ▶

 
 
Image: 8 questions to answer before paying a ransomware demand

8 questions to answer before paying a ransomware demand

Consider these factors before deciding to pay a ransom after a ransomware attack. Better yet, know where you stand before one hits you. Read more ▶

Image: Cell phones don't belong in SCIFs, says Republican congressman

Cell phones don't belong in SCIFs, says Republican congressman

Rep. Mike Rogers says his phone was infected by Russian malware three years ago. Also, why he believes we need fewer federal cybersecurity agencies and election laws. Read more ▶

Image: Compliance mandates, cybersecurity best practices dominate 2019 security priorities

Compliance mandates, cybersecurity best practices dominate 2019 security priorities

IDG's Security Priorities Study shows most organizations' security efforts are driven by compliance requirements and efforts to improve security best practices. Read more ▶

Image: How to audit permissions after a Windows migration

How to audit permissions after a Windows migration

As companies move off Windows 7 and Server 2008, they run the risk of leaving dangerous access permissions behind. Here's how to find them. Read more ▶

eBook: ServiceNow Inc

Plan your successful CMDB deployment

Learn the 4 key stages to deploying a healthy CMDB with this ebook including real-life examples that you can put into practice today. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.