CSO

CSO Update

September 12, 2019

Image: The 5 CIS controls you should implement first

The 5 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first. Read more ▶

Your Must-Read Stories

6 biggest healthcare security threats for 2020

Implementing a successful cyber insurance program: Key steps and considerations

New NetCAT CPU side-channel vulnerability exploitable over the network

Security and compliance considerations for Microsoft Teams

Why every business should consider ISO 27701 compliance for their vendors

8 hot IT security jobs and what they pay

White Paper: Ping Identity

The IT Director's Guide to Multi-Factor Authentication

Multi-factor authentication begins with the notion that you can and should provide multiple factors for authentication, not just a single static means. MFA goes beyond 2FA by requiring users to authenticate via two or more different authentication factors. Read more ▶

Image: 6 biggest healthcare security threats for 2020

6 biggest healthcare security threats for 2020

Healthcare continues to be a popular target for ransomware, cryptomining, data theft, phishing, and insider threats. Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: Implementing a successful cyber insurance program: Key steps and considerations

Implementing a successful cyber insurance program: Key steps and considerations

In a first, a Black Hat micro summit explains how insurers assess risk to write cyber insurance policies as more organizations seek to indemnify themselves against potential breach losses. Read more ▶

 
 
Image: New NetCAT CPU side-channel vulnerability exploitable over the network

New NetCAT CPU side-channel vulnerability exploitable over the network

NetCAT takes advantage of Intel DDIO technology to remotely execute keystroke timing attacks. Read more ▶

Image: Security and compliance considerations for Microsoft Teams

Security and compliance considerations for Microsoft Teams

Admins will need to make these decisions around security and governance when porting from Office 365 Pro Plus to Microsoft Teams. Read more ▶

Image: Why every business should consider ISO 27701 compliance for their vendors

Why every business should consider ISO 27701 compliance for their vendors

The new standard provide a comprehensive set of controls for information security and the protection of personal information. Read more ▶

Image: 8 hot IT security jobs and what they pay

8 hot IT security jobs and what they pay

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Are you being paid what you are worth? Take a minute to check. Read more ▶

White Paper: Getronics, a Hewlett Packard Enterprise Platinum Partner

Hyperconvergence: The Key to a Simple, Efficient Data Center

Read the White Paper to learn how HPE SimpliVity, powered by Intel® Xeon® Scalable processors, goes further with built-in deduplication, all-flash storage, backup software and data replication. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.