CSO

CSO Update

September 10, 2019

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

Your Must-Read Stories

IoT vendors ignore basic security best practices, CITL research finds

2fa explained: How to enable it and how it works

Top mobile VPNs for the enterprise

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

What Andrew Luck's retirement can teach infosec leaders

Cloud security: Inside the shared responsibility model

White Paper: Dell/EMC

Dell EMC Integrated Data Protection Appliance DP4400

This ESG Technical Review documents hands-on validation of the Dell EMC Integrated Data Protection Appliance (IDPA) DP4400. Read more ▶

Image: IoT vendors ignore basic security best practices, CITL research finds

IoT vendors ignore basic security best practices, CITL research finds

New measurements by the CITL mass fuzzing project show just how bad things really are--and how IoT device makers could radically increase binary security with one day of engineering work. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn't Just for the 1 Percent Read more ▶

Image: 2fa explained: How to enable it and how it works

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online service. Read more ▶

 
 
Image: Top mobile VPNs for the enterprise

Top mobile VPNs for the enterprise

Any of these six VPNs can securely connect mobile devices to your enterprise network if it supports the configuration options you need. Read more ▶

Image: Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Leader of new NSA Cybersecurity Directorate outlines threats, objectives

Director Anne Neuberger says her group will focus on ransomware, threats to US elections, and nation-state influence operations. Read more ▶

Image: What Andrew Luck's retirement can teach infosec leaders

What Andrew Luck's retirement can teach infosec leaders

Andrew Luck was an incredible quarterback who performed at very high levels despite numerous hits and injuries. At the age of 29, he walked away from the sport he loved and untold millions of dollars. This action, and the reaction from two media personalities, can teach us about team engagement. It also teaches why team building, development and avoiding burnout and stressors are important. Read more ▶

Image: Cloud security: Inside the shared responsibility model

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem. Read more ▶

Miscellaneous: OpenTech Systems, Inc

How to Marry Your Content and Business Processes for Intelligent Automation

Becoming a digital organization begins first and foremost with providing knowledge workers with the tools they need to improve their own productivity and to automate the processes for which they have responsibility — and do this without losing control. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.