CSO

CSO Update

September 17, 2019

Image: Three strategies to prove security's value

Three strategies to prove security's value

How CISOs can identify and quantify security’s value in real dollars Read more ▶

Your Must-Read Stories

•

The top 5 email encryption tools: More capable, better integrated

•

What is PSD2? And how it will impact the payments processing industry

•

The 5 CIS controls you should implement first

•

How to set up Microsoft Teams for security and compliance

•

8 hot IT security jobs and what they pay

Video/Webcast: Silver Peak Systems Inc

2018 Gartner Magic Quadrant For WAN Edge Infrastructure

Looking for guidance on narrowing your search for an SD-WAN solution to address your evolving business needs? Watch this webcast to gain the latest insights as Gartner VP Analyst, Andrew Lerner and Silver Peak founder and CEO, David Hughes discuss the characteristics of the new WAN edge infrastructure market and how Silver Peak uniquely addresses these evolving enterprise requirements. Read more ▶

Image: The top 5 email encryption tools: More capable, better integrated

The top 5 email encryption tools: More capable, better integrated

Most of the email encryption solution vendors have broadened the scope of their products to include anti-phishing, anti-spam, and data loss prevention (DLP). Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: What is PSD2? And how it will impact the payments processing industry

What is PSD2? And how it will impact the payments processing industry

The EU’s revised Payment Services Directive (PSD2), which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere. Read more ▶

 
 
Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: How to set up Microsoft Teams for security and compliance

How to set up Microsoft Teams for security and compliance

These are the security and compliance decisions you need to make when deploying Microsoft Teams. Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

White Paper: Silver Peak Systems Inc

2018 Trends in SD-WAN

Today, most WAN traffic, to and from branch and remote sites, is destined for the cloud, either to SaaS services or applications hosted in an IaaS environment. The traditional WAN was architected for branch-to-data-center traffic flows, not to efficiently support new cloud-driven traffic patterns. Starting in 2018, most enterprises will adopt a "cloud-first" SD-WAN architecture designed to efficiently and effectively support the ongoing evolution in their application mix. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.