CSO

CSO Daily

September 10, 2019

Image: Top mobile VPNs for the enterprise

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need. Read more ▶

Your Must-Read Stories

•

IoT vendors ignore basic security best practices, CITL research finds

•

8 hot IT security jobs and what they pay

•

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

•

ICS as a cloud service is coming: Will the benefits outweigh the risks?

•

Are you taking third-party risk seriously enough?

•

Cloud security: Inside the shared responsibility model

White Paper: Dell/EMC

Dell EMC Integrated Data Protection Appliance DP4400

This ESG Technical Review documents hands-on validation of the Dell EMC Integrated Data Protection Appliance (IDPA) DP4400. Read more ▶

Image: IoT vendors ignore basic security best practices, CITL research finds

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn’t Just for the 1 Percent Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

 
 
Image: Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Director Anne Neuberger says her group will focus on ransomware, threats to US elections, and nation-state influence operations. Read more ▶

Image: ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity. Read more ▶

Image: Are you taking third-party risk seriously enough?

Are you taking third-party risk seriously enough?

Because third parties are often responsible for data breaches, your internal security standards must extend beyond your borders to cover vendors and other external partners. Read more ▶

Image: Cloud security: Inside the shared responsibility model

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem. Read more ▶

Miscellaneous: OpenTech Systems, Inc

How to Marry Your Content and Business Processes for Intelligent Automation

Becoming a digital organization begins first and foremost with providing knowledge workers with the tools they need to improve their own productivity and to automate the processes for which they have responsibility — and do this without losing control. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.