CSO

CSO Daily

September 17, 2019

Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Your Must-Read Stories

•

Three strategies to prove security's value

•

What is PSD2? And how it will impact the payments processing industry

•

The 5 CIS controls you should implement first

•

Why every business should consider ISO 27701 compliance for their vendors

•

6 biggest healthcare security threats for 2020

Video/Webcast: Silver Peak Systems Inc

2018 Gartner Magic Quadrant For WAN Edge Infrastructure

Looking for guidance on narrowing your search for an SD-WAN solution to address your evolving business needs? Watch this webcast to gain the latest insights as Gartner VP Analyst, Andrew Lerner and Silver Peak founder and CEO, David Hughes discuss the characteristics of the new WAN edge infrastructure market and how Silver Peak uniquely addresses these evolving enterprise requirements. Read more ▶

Image: Three strategies to prove security's value

Three strategies to prove security's value

How CISOs can identify and quantify security’s value in real dollars Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: What is PSD2? And how it will impact the payments processing industry

What is PSD2? And how it will impact the payments processing industry

The EU’s revised Payment Services Directive (PSD2), which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere. Read more ▶

 
 
Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: Why every business should consider ISO 27701 compliance for their vendors

Why every business should consider ISO 27701 compliance for their vendors

The new standard provide a comprehensive set of controls for information security and the protection of personal information. Read more ▶

Image: 6 biggest healthcare security threats for 2020

6 biggest healthcare security threats for 2020

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read more ▶

White Paper: Silver Peak Systems Inc

2018 Trends in SD-WAN

Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Starting in 2018, most enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently and effectively support the ongoing evolution in their application mix. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.