CSO

CSO Daily

September 16, 2019

Image: Three strategies to prove security's value

Three strategies to prove security's value

How CISOs can identify and quantify security’s value in real dollars Read more ▶

Your Must-Read Stories

•

What is the EU's revised Payment Services Directive (PSD2) and its impact?

•

Privacy Shield and Brexit: What now? What next?

•

Security and compliance considerations for Microsoft Teams

•

The 5 CIS controls you should implement first

•

Shining light on dark data, shadow IT and shadow IoT

•

Implementing a successful cyber insurance program: Key steps and considerations

Video/Webcast: Red Hat & AWS

The Business Value of an Agile Platform for Developing and Running Applications with OpenShift on AWS

Application development. It’s a critical piece of most organizations. Speed, reliability and security are paramount. An agile and flexible platform for developing applications can be a key competitive advantage. Read more ▶

Image: What is the EU's revised Payment Services Directive (PSD2) and its impact?

What is the EU's revised Payment Services Directive (PSD2) and its impact?

The upcoming PSD2 requirements, which include multifactor authentication for online European payment card transactions, will have a ripple effect on the payments processing industry in the U.S. and elsewhere. Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: Privacy Shield and Brexit: What now? What next?

Privacy Shield and Brexit: What now? What next?

Once the UK leaves the European Union, companies on both sides of the Atlantic will need to act to ensure compliant data flows between the UK and US under Privacy Shield. Read more ▶

 
 
Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Image: Shining light on dark data, shadow IT and shadow IoT

Shining light on dark data, shadow IT and shadow IoT

What's lurking in the shadows of YOUR organization? What you don't know can hurt you. Insider Pro columnist Mike Elgan looks at how your business is at risk and offers six steps to minimize it. Read more ▶

Image: Implementing a successful cyber insurance program: Key steps and considerations

Implementing a successful cyber insurance program: Key steps and considerations

In a first, a Black Hat micro summit explains how insurers assess risk to write cyber insurance policies as more organizations seek to indemnify themselves against potential breach losses. Read more ▶

White Paper: Lastline Inc

False Positives: The Cure is Worse than the Disease

SOCs are inundated by high-volume, low-fidelity alerts. Inaccurate detection technology, inability to correlate event data, lack of context, and no alert consolidation are overwhelming 79% of SOCs. More alarming are the risky way SOCs combat alert volumes. Learn more by reading “False Positives: The Cure is Worse than the Disease.” Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.