Editor’s Note: Welcome Computerworld, Network World, CIO and InfoWorld readers

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Jun 15, 2017
Featured Image

The 15 worst data security breaches of the 21st Century

Security practitioners weigh in on the 15 worst data security breaches in recent memory. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Editor’s Note: Welcome Computerworld, Network World, CIO and InfoWorld readers
How to stop wasting money on security shelfware
The 6 best password managers
Medical devices: Embedded product security
Who's Down with MPC? (Yeah, You Know Me!)

White Paper: Sophos Inc

Exploits. Intercepted.

Exploits are one of the main techniques used by cybercriminals to spread malware. They take advantage of weaknesses in legitimate software products like Flash and Microsoft Office to infect computers for their criminal ends. A single exploit can be used by myriad separate pieces of malware, all with different payloads. Read More

Editor’s Note: Welcome Computerworld, Network World, CIO and InfoWorld readers

Welcome subscribers to Computerworld’s Security newsletter, Network World’s Security Alert newsletter, InfoWorld’s Security Report newsletter, and CIO’s Security newsletter. You are receiving this newsletter as the result of a merging of newsletter lists across CSO, Computerworld, Network World, CIO and InfoWorld. We hope you'll find it valuable, but you can unsubscribe at any time by going to the newsletter signup page (http://www.csoonline.com/newsletters/signup.html). Read More

Thumbnail Image

How to stop wasting money on security shelfware

Investing in security tools that end-up on the shelf or underutilized is not inevitable, and it can be reduced or even eliminated by some proactive and surprisingly simple first steps. Read More

Thumbnail Image

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read More

Thumbnail Image

Medical devices: Embedded product security

Medical devices may have significant security risks associated with them. Let's look at the vulnerabilities they may have. Read More

Thumbnail Image

Who's Down with MPC? (Yeah, You Know Me!)

MultiParty Computation improves data security by calculating encrypted information - what is not revealed cannot be leaked. Read More

White Paper: Sophos Inc

Firewall Buyers Guide

With firewalls becoming increasingly complex, buying one can be a confusing experience. And even when you've identified requirements you need for your firewall, trudging through each vendor's website and datasheets is a time-consuming process. This guide has been designed to make finding the right firewall easy for you. It pulls together the critical capabilities and features that all firewalls should have. Read More

CSO Insider

1. 4 places to find cybersecurity talent in your own organization
2. What it takes to be a security software developer
3. How to write an information security policy
4. Contract obligations, third parties, and cyber insurance
5. Red team versus blue team: How to run an effective simulation

Editor's Picks

1. Why you don't need an RFID-blocking wallet
2. Recap: News agency hack blamed for diplomatic meltdown in Qatar
3. How computer security pros hack the hackers
4. FireEye 2.0: Cyberhumans as a Service
5. Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.