CSO

CSO Update

September 03, 2019

Image: 5 signs your security culture is toxic (and 5 ways to fix it)

5 signs your security culture is toxic (and 5 ways to fix it)

Here's how to get the security culture you want if you see these warning signs in your organization. Read more ▶

Your Must-Read Stories

ICS as a cloud service is coming: Will the benefits outweigh the risks?

How secure are your AI and machine learning projects?

What is Wireguard? Secure, simple VPN still in development

Why you need a cybersecurity incident response specialist

Data privacy in the IoT age: 4 steps for reducing risk

What is the cost of a data breach?

White Paper: Dropbox

The Value of Dropbox Business in Supporting Employee Collaboration

The modern enterprise is a distributed organization, with contractors, customers, employees, and vendors all working together to move the company forward. Read more ▶

Image: ICS as a cloud service is coming: Will the benefits outweigh the risks?

ICS as a cloud service is coming: Will the benefits outweigh the risks?

Plugging industrial control and operational technology equipment into cloud-based monitoring and remote management systems increases visibility, but it also takes away their security by obscurity. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn't Just for the 1 Percent Read more ▶

Image: How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how several companies have minimized their risk. Read more ▶

 
 
Image: What is Wireguard? Secure, simple VPN still in development

What is Wireguard? Secure, simple VPN still in development

The Wireguard VPN offers better performance and a simpler, effective approach to cryptography. Is it ready for the enterprise? Read more ▶

Image: Why you need a cybersecurity incident response specialist

Why you need a cybersecurity incident response specialist

If your cyber insurance provider gives you the number of an incident response specialist, call them now. It will save time when an attack occurs. Read more ▶

Image: Data privacy in the IoT age: 4 steps for reducing risk

Data privacy in the IoT age: 4 steps for reducing risk

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company. Read more ▶

Image: What is the cost of a data breach?

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them. Read more ▶

Miscellaneous: Adobe Systems Inc.

From Email to Virtual Reality: The Impact of Technology on Employee Experience

In an effort to understand the impact of employee-facing technologies on employee experience, Adobe partnered with IDG in June 2018 to survey 372 respondents in IT-related roles. This report delves into key findings to determine how technologies, from old-standby email to futurisitc VR/AR tools, are both challenging IT teams and benefiting employees. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.