Fixing the communications breakdown between IT security and the board and c-suite

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Nov 03, 2016
Featured Image

Top 5 reasons to quit your cybersecurity job

The downsides with making a career switch go away in a market with zero-percent unemployment. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Fixing the communications breakdown between IT security and the board and c-suite
Leadership: From dictator to enabler
How secure are home robots?
It’s hunting season but who’s the prey?
DDoS attack on Dyn could have been prevented

White Paper: IBM Corporation

12 Reasons You Don't Need to Monitor Your Apps

Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says! Read More

Thumbnail Image
INSIDER

Fixing the communications breakdown between IT security and the board and c-suite

Stop buying the first security solution that comes down the pike and solve the communications logjam first. Read More

Thumbnail Image

Leadership: From dictator to enabler

Defeating highly adaptable cyber attackers takes the same kind of leadership it took to defeat highly adaptable terrorists in Iraq, according to Ret. Gen. Stanley McChrystal: Enabling the expertise within the organization. Read More

Thumbnail Image
INSIDER

How secure are home robots?

They have blinking lights and tend to chirp constantly. One of them can vacuum your living room carpet on a schedule. Another can play games with the kids using artificial intelligence. Yet, for homeowners (and security professionals) there’s a question about whether home robots could become an attack vector for hackers. Read More

Thumbnail Image

It’s hunting season but who’s the prey?

There’s a trend in security operations to work to close the gap between discovering a breach after the damage has been inflicted, and delving deeper into the infrastructure to evaluate the “What/Where/When/How” in an effort to advance the security team’s preemptive efforts in deterring or at least containing malicious activity. And with one report suggesting ransomware being up almost 90 percent over last year, it’s getting a bit confusing as to which side of the “hunting season” organizations are finding themselves. Read More

Thumbnail Image

DDoS attack on Dyn could have been prevented

The Online Trust Association issued a prescription earlier this year for securing IoT devices. But even the association’s director admits that, with billions of devices already in use, change will not come easily or quickly. Read More

White Paper: IBM Corporation

Application Performance Management for App-Driven Businesses

This paper explains the importance of APM to today's businesses, provides recommendations that companies should consider when evaluating solutions, and suggests steps companies can take now to adopt APM solutions. Read More

Top 5 Stories

1. 17 essential tools to protect your online identity, privacy
2. Google to untrust WoSign and StartCom certificates
3. Why don't developers have a 'spellchecker' for security'?
4. Google discloses Windows zero-day, Microsoft argues disclosure ethics
5. Enterprises continue to struggle to find cybersecurity talent, survey finds

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.