CSO

CSO Update

March 12, 2019

Image: What are the new China Cybersecurity Law provisions? And how CISOs should respond

What are the new China Cybersecurity Law provisions? And how CISOs should respond

New provisions to the China Cybersecurity Law allow the Chinese government access to enterprise networks operating in the country. Although the security risk that presents is unclear, CISOs can take steps to minimize the impact. Read more ▶

Your Must-Read Stories

Preserving the privacy of large data sets: Lessons learned from the Australian census

The buzz at RSA 2019: Cloud security, network security, managed services and more

The new CISO's playbook: 5 rules to follow

The best password advice right now (Hint: It's not the NIST guidelines)

7 hot cybersecurity trends (and 4 going cold)

How to hack a smartcard to gain privileged access

White Paper: Dropbox

The Art of Culture Hacking - Gartner

What's the biggest barrier to change and transformation? According to CIOs, the resounding answer is culture, but that's not a very useful answer. Culture is big, unwieldy and hard to change. Most CIOs approach big change with big transformation efforts. We suggest you hack your culture instead. Read more ▶

Image: Preserving the privacy of large data sets: Lessons learned from the Australian census

Preserving the privacy of large data sets: Lessons learned from the Australian census

Preserving the privacy of large data sets is hard, as the Australian Bureau of Statistics found out. These are the big takeaways for the upcoming U.S. census and others dealing with large amounts of personal data. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019: Cloud security, network security, managed services and more

The buzz at RSA 2019 included talk about cybersecurity and business leaders coming together, managed services, cloud security, network security and more. Read more ▶

 
 
Image: The new CISO's playbook: 5 rules to follow

The new CISO's playbook: 5 rules to follow

Today's privacy and regulatory requirements, breadth of threats and bad employee behavior require chief information security officers to add some new moves to the old playbook. Read more ▶

Image: The best password advice right now (Hint: It's not the NIST guidelines)

The best password advice right now (Hint: It's not the NIST guidelines)

Short and crackable vs. long, complex and prone to reuse? The password debate rages on, but this columnist has a change of mind. Read more ▶

Image: 7 hot cybersecurity trends (and 4 going cold)

7 hot cybersecurity trends (and 4 going cold)

Is that security trend hot or not? From tools and technologies to threats, tactics, and training, the numbers don't lie. Read more ▶

Image: How to hack a smartcard to gain privileged access

How to hack a smartcard to gain privileged access

Using smartcards in a Microsoft Active Directory environment makes them vulnerable to this privilege escalation attack. Read more ▶

Miscellaneous: Dropbox

Magic Quadrant for Content Collaboration Platforms

Learn why Gartner named Dropbox a Leader MQ. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.