CSO

CSO Update

September 29, 2019

Image: What a security career will look like in five years

What a security career will look like in five years

Get ready for 'BISOs' in the business, security positions on the customer experience team, and AI taking over cyber jobs – but in a good way. Read more ▶

Your Must-Read Stories

How to migrate smartphone users to the Outlook app with Intune

5 trends shaking up multi-factor authentication

Cyber-risk management is about to get easier

Social engineering explained: How criminals exploit human behavior

The CSO guide to top security conferences, 2019

Take our 2020 IT Salary Survey. Get a chance to win $500.

eBook: Zero Delta

The Essential Guide to Risk-Based Vulnerability Orchestration across the Software Lifecycle

This eBook reviews the opportunities and challenges in front of companies as they embark upon an effort to drive risk-based approach to vulnerability orchestration across applications and infrastructure. Read more ▶

Image: How to migrate smartphone users to the Outlook app with Intune

How to migrate smartphone users to the Outlook app with Intune

With the pending retirement of Microsoft Basic Authentication, the best way to protect mobile device users connecting through Exchange is to move them to Outlook. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: 5 trends shaking up multi-factor authentication

5 trends shaking up multi-factor authentication

Universal adoption of multi-factor authentication (MFA) is hindered by technical limitations and user resistance, but its use is growing. Here's why. Read more ▶

 
 
Image: Cyber-risk management is about to get easier

Cyber-risk management is about to get easier

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions. Read more ▶

Image: Social engineering explained: How criminals exploit human behavior

Social engineering explained: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data. Read more ▶

Image: The CSO guide to top security conferences, 2019

The CSO guide to top security conferences, 2019

CSO Online's calendar of upcoming security conferences makes it easy to find the events that matter the most to you. Read more ▶

Image: Take our 2020 IT Salary Survey. Get a chance to win $500.

Take our 2020 IT Salary Survey. Get a chance to win $500.

Whether you're scouting out a new job or looking to fill a key IT role, access to salary data is an important tool. Help us help you by taking our 10-minute IT Salary Survey. Read more ▶

Video/Webcast: Adobe Systems Inc.

The Top 10 Trends Business Leaders Must Know Before 2020

Self-professed data nerds Jeff Ma and Tamara Gaffney have scoured thousands of data reports to bring you 45 minutes of the most essential business trends for 2020 and how to prepare for them. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Copyright © 2019 CSO, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.