CSO

CSO Update

March 10, 2020

Image: Top cybersecurity facts, figures and statistics for 2020

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry. Read more ▶

Your Must-Read Stories

How Visa built its own container security solution

Making the case for hardware 2FA in the enterprise

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

Intel CSME flaw is unpatchable, researchers warn

How to write an effective information security policy

10 biggest cybersecurity M&A deals of 2019

White Paper: Veeam Software Corporation & PureStorage

Veeam-Pure Storage integration

This white paper reviews the features of Veeam Availability Suite and the benefits of Pure Storage integration with Veeam's Universal Storage API. Read more ▶

Image: How Visa built its own container security solution

How Visa built its own container security solution

The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries. Read more ▶

Image: GoDaddy Websites + Marketing is perfect for new brands looking to get online.

DEALPOST

GoDaddy Websites + Marketing is perfect for new brands looking to get online.

GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more ▶

Image: Making the case for hardware 2FA in the enterprise

Making the case for hardware 2FA in the enterprise

Hardware 2FA tokens are the best and cheapest defense against phishing and credential stuffing attacks, but there are some gotchas. Read more ▶

 
 
Image: Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

Is the EARN-IT Act a backdoor attempt to get encryption backdoors?

New bipartisan US legislation to fight online child exploitation incentivizes companies to drop end-to-end encryption, critics say. Read more ▶

Image: Intel CSME flaw is unpatchable, researchers warn

Intel CSME flaw is unpatchable, researchers warn

Researchers reveal that a previously known Intel flaw is unpatchable and could allow attackers to compromise the cryptographic chain of trust in Intel systems. Read more ▶

Image: How to write an effective information security policy

How to write an effective information security policy

An information security policy is a high-level view of what should be done within a company in regard to information security. Here's how to create one that is an effective tool for improving your security posture. Read more ▶

Image: 10 biggest cybersecurity M&A deals of 2019

10 biggest cybersecurity M&A deals of 2019

This past year has been a very active one for mergers and acquisitions in the cybersecurity industry as companies seek to expand their offerings. What will the 2020 M&A market be like? Read more ▶

White Paper: Veeam Software Corporation & PureStorage

Protecting mission critical data with backup and replication from Pure Storage and Veeam

The purpose of this white paper is to showcase the ease of integration, best practices and expected performance results for data backup and restore using Pure Storage FlashArray, Veeam® Backup & Replication 9.5™ and Pure Storage FlashBlade data solutions using realistic, real-world examples. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Update as tuwanan.mono@blogger.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | CSO | 492 Old Connecticut Path | Framingham, MA 01701 | www.csoonline.com