BlackBerry's acquisition of Cylance raises eyebrows in the security community

Email not displaying correctly? View it in your browser.

CSO

CSO Update

Nov 20, 2018
Featured Image

9 cyber security predictions for 2019

CSO staff and contributors tell what they hope or fear will happen in the infosec world for the coming year. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

BlackBerry's acquisition of Cylance raises eyebrows in the security community
With supply chain security grabbing headlines, NIST sees new relevance for its guidance
The 7 deadly sins of endpoint detection & response
How to set up a successful digital forensics program
Review: Protecting multi-cloud environments with Threat Stack
Digital identity, the blockchain and the GDPR: A round peg in a square hole?
Thumbnail Image

BlackBerry's acquisition of Cylance raises eyebrows in the security community

BlackBerry's move into the endpoint security game may create public safety issues, given the company's love affair with encryption backdoors, experts say. Read More

Thumbnail Image
INSIDER

With supply chain security grabbing headlines, NIST sees new relevance for its guidance

Supply chain is sexy again, and NIST hopes that means more companies take its supply chain risk guidance seriously. Read More

Thumbnail Image
INSIDER

The 7 deadly sins of endpoint detection & response

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider. Read More

Thumbnail Image
INSIDER

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make. Read More

Thumbnail Image
INSIDER

Review: Protecting multi-cloud environments with Threat Stack

Because it's intended for use in environments that require constant uptime, Threat Stack simply concentrates on the detection aspect of cybersecurity, alerting admins when suspicious activity is spotted. Read More

Thumbnail Image
INSIDER

Digital identity, the blockchain and the GDPR: A round peg in a square hole?

Can an immutable record and GDPR data subject rights co-exist? Why blockchain might not be able to deliver on data privacy requirements. Read More

Editor's Picks

1. 10 essential enterprise security tools (and 11 nice-to-haves)
2. 7 best practices for negotiating ransomware payments
3. Are long passphrases the answer to password problems?
4. Bruce Schneier's Click Here to Kill Everybody reveals the looming cybersecurity crisis
5. Cybercriminals are using blockchain to improve security. Should you?
6. 5 hard truths every CISO should know
7. What it takes to be a security consultant

Get Security Smart

From the editors of CSO, Security Smart is a quarterly security awareness newsletter ready for distribution in your organization. Subscribe now and arm your employees with the information they need to be more secure at home and at work. Learn more.
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.