CSO

The day's top cybersecurity news and in-depth coverage

CSO First Look

October 21, 2020

The 4 pillars of Windows network security

Microsoft's CISO breaks down which four key areas to focus on to secure Windows networks: passwordless identity management, patch management, device control and benchmarks. Read more ▶

Sponsored by Cisco: CSO Podcast - 6 Tips to Building Better Board Relationships

Over the past decade, CSOs have had more interaction with their boards of directors, becoming critical partners and driving risk management. Listen in as we share 6 guidelines for building board relationships, starting with inspiring confidence, which may be the most important thing a CSO can do.

8 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Duo, Cisco Webex, FaceTime, Jitsi, Signal and WhatsApp. What does their encryption look like? What are the trade-offs?

US DOJ indictments might force Russian hacker group Sandworm to retool

Experts hope that indictments against six Russian military intelligence agents will make Russia rethink plans to disrupt the US election.

White Paper | Hewlett Packard Enterprise (HPE)

The CIO’s As-a-Service Playbook

What is As-a-Service and consumption-based IT, and what does it mean for your business? How does it work, and how do you apply the consumption model to the full IT stack? This playbook answers these and many other questions about the As-a-Service model, including how to justify an investment in As-a-Service, important terms and concepts, and how to evaluate a provider. You’ll also learn about HPE GreenLake, which enables the same cloud experience everywhere — including in on-premises data centers, at the edge, and in multi-clouds. Read about how HPE GreenLake works, key benefits, FAQs, and – perhaps most important – potential ROI for your enterprise.

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

CSO
Facebook Twitter LinkedIn
© 2020 CSO
492 Old Connecticut Path
Framingham, MA 01701