Resiliency, staying afloat in the face of cyber threats

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 07, 2017
Featured Image

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Resiliency, staying afloat in the face of cyber threats
Why CSOs and CISOs need to care about machine learning
What's the key to surviving as a cyber-security start-up?
Pitfalls of identity access management
Debating the impact of marketing on the security industry

Video/Webcast: Coresite

3 Ways to Leverage Colocation for Business Continuity Planning

Business continuity is moving up the list of enterprise IT priorities, and there are more choices for aligning cloud models with business objectives. When you are evaluating a solution, you should bear three models in mind - classic, virtual and hybrid. In this video, we highlight the advantages of each. Read More

Thumbnail Image

Resiliency, staying afloat in the face of cyber threats

Today's reality is that if the enterprise uses networked computers, they will get hit at some point. Not having and practicing a recovery plan could be the doom of any organization. Read More

Thumbnail Image

Why CSOs and CISOs need to care about machine learning

Michael A. Davis of CounterTack explains the security challenges around machine learning, and how some of the issues can be solved for free (yes, free!) Read More

Thumbnail Image

What's the key to surviving as a cyber-security start-up?

It’s always a gamble to establish a start-up, but if you were to choose any sector where you’d fancy your chances of success, it would surely be cyber-security. Read More

Thumbnail Image

Pitfalls of identity access management

Whether dealing with a third parties access or tracking an insider through your network, action needs to be take to see who goes where. Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Read More

Thumbnail Image

Debating the impact of marketing on the security industry

Jennifer Leggio winds up for the launch of the new Security Slapshot series with some bold statements on the impact of marketing on the security industry Read More

White Paper: Coresite

Best Practices: Leveraging Cloud and Colocation to Avoid Downtime

It is critical for business applications to be up and running 100% of the time, but managing IT infrastructure is complex. In this white paper, we compare three business continuity models that address traditional and emerging threats, and make recommendations on how to streamline your solution. Read More

Top 5 Stories

1. Making sense of cybersecurity qualifications
2. Recent Google Docs Phishing attack is a win for Blue Teams
3. Believe your employer doesn’t know about your legal problems? Think again
4. Google Drive phishing is back -- with obfuscation
5. How the insurance industry could change the game for security

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.