CSO

CSO Update

September 01, 2019

Image: Improving BGP routing security by minding your MANRS

Improving BGP routing security by minding your MANRS

Enterprises can improve their routing security for modest costs, according to the Mutually Agreed Norms for Routing Security (MANRS) project. Read more ▶

Your Must-Read Stories

Data privacy in the IoT age: 4 steps for reducing risk

6 ways cybercriminals use commercial infrastructure

Why you need a cybersecurity incident response specialist

Capital One hack shows difficulty of defending against irrational cybercriminals

3 leading network access control products reviewed

Security Recruiter Directory

eBook: Riverbed Technology

Four Gaps Your APM Tool Can't Cover (But Needs To)

IT operations teams have historically leveraged application performance monitoring (APM) tools to ensure the availability and performance of critical business apps. But the adoption of SaaS apps, cloud-native development strategies, and other technologies that fuel today's digital transformation initiatives are straining traditional APM solutions, leaving noticeable gaps in IT's monitoring strategies. Read more ▶

Image: Data privacy in the IoT age: 4 steps for reducing risk

Data privacy in the IoT age: 4 steps for reducing risk

As internet of things (IoT) devices proliferate, corporate security teams face a steep challenge around data privacy. Here's what you can do now to protect your company. Read more ▶

Image: Anyone Can Invest in Real Estate with DiversyFund

DEALPOST

Anyone Can Invest in Real Estate with DiversyFund

Investing in Real Estate Isn't Just for the 1 Percent Read more ▶

Image: 6 ways cybercriminals use commercial infrastructure

6 ways cybercriminals use commercial infrastructure

Whether through fraud or legitimate purchase, cybercriminals increasingly depend on mainstream services to support their activities. Read more ▶

 
 
Image: Why you need a cybersecurity incident response specialist

Why you need a cybersecurity incident response specialist

If your cyber insurance provider gives you the number of an incident response specialist, call them now. It will save time when an attack occurs. Read more ▶

Image: Capital One hack shows difficulty of defending against irrational cybercriminals

Capital One hack shows difficulty of defending against irrational cybercriminals

The motivation of the malicious actor who stole data of more than 100 million people was driven by emotional distress and did not follow traditional hacker patterns. Read more ▶

Image: 3 leading network access control products reviewed

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.) Read more ▶

Image: Security Recruiter Directory

Security Recruiter Directory

To find the right security job or hire the right candidate, you first need to find the right recruiter. CSO's security recruiter directory is your one-stop shop. Read more ▶

eBook: Riverbed Technology

Covering Your SaaS: How to manage the end-user experience of application environments you don't fully control

How to take back control of SaaS apps and validate their impact on the business with end-user experience monitoring Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.